Offline witness encryption with semi-adaptive security
From MaRDI portal
Publication:2229274
DOI10.1007/978-3-030-57808-4_12OpenAlexW3081996254MaRDI QIDQ2229274
Saqib A. Kakvi, Tibor Jager, Peter Chvojka
Publication date: 23 February 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-57808-4_12
Related Items (5)
Identity-based encryption in DDH hard groups ⋮ Witness encryption from smooth projective hashing system ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ Offline witness encryption with semi-adaptive security ⋮ Towards witness encryption without multilinear maps
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
- Non-malleable secret sharing for general access structures
- Laconic oblivious transfer and its applications
- Two-message witness indistinguishability and secure computation in the plain model from new assumptions
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Graded encoding schemes from obfuscation
- How to build time-lock encryption
- Offline witness encryption with semi-adaptive security
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Multilinear Maps from Obfuscation
- How to Avoid Obfuscation Using Witness PRFs
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Offline Witness Encryption
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
- How to Run Turing Machines on Encrypted Data
- Secret-Sharing for NP
- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
- Constant-Round MPC with Fairness and Guarantee of Output Delivery
- Candidate Multilinear Maps from Ideal Lattices
- 0-RTT Key Exchange with Full Forward Secrecy
- Advances in Cryptology – CRYPTO 2004
- On the (im)possibility of obfuscating programs
- Functional Signatures and Pseudorandom Functions
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Witness encryption and its applications
- Predictable Arguments of Knowledge
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
- On Extractability Obfuscation
- Theory of Cryptography
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
This page was built for publication: Offline witness encryption with semi-adaptive security