Secure software leasing from standard assumptions
From MaRDI portal
Publication:2695623
DOI10.1007/978-3-030-90459-3_2OpenAlexW3097625932MaRDI QIDQ2695623FDOQ2695623
Authors: Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
Publication date: 31 March 2023
Full work available at URL: https://arxiv.org/abs/2010.11186
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Quantum money from knots
- Theory of Cryptography
- Limitations of Quantum Advice and One-Way Communication
- On the (im)possibility of obfuscating programs
- Lossy Trapdoor Functions and Their Applications
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- Return of GGH15: provable security against zeroizing attacks
- One-shot signatures and applications to hybrid quantum/classical authentication
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- Secure software leasing
- Candidate obfuscation via oblivious LWE sampling
- Watermarking cryptographic capabilities
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
- Semi-quantum money
- Watermarking public-key cryptographic primitives
- New approaches for quantum copy-protection
- Secure software leasing without assumptions
- Counterexamples to new circular security assumptions underlying iO
- Indistinguishability obfuscation from circular security
- A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device
Cited In (14)
- Public key encryption with secure key leasing
- Public-key watermarking schemes for pseudorandom functions
- Franchised quantum money
- Publicly verifiable deletion from minimal assumptions
- Revocable cryptography from learning with errors
- Semi-quantum copy-protection and more
- Collusion resistant copy-protection for watermarkable functionalities
- Cloning games: a general framework for unclonable primitives
- Watermarking PRFs against quantum adversaries
- Functional encryption with secure key leasing
- Quantum CCA-secure PKE, revisited
- Certified everlasting secure collusion-resistant functional encryption, and more
- Software with certified deletion
- Watermarking PRFs and PKE against quantum adversaries
This page was built for publication: Secure software leasing from standard assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2695623)