Secure software leasing from standard assumptions
From MaRDI portal
Publication:2695623
Cites work
- A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device
- Candidate obfuscation via oblivious LWE sampling
- Counterexamples to new circular security assumptions underlying iO
- Indistinguishability obfuscation from circular security
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Limitations of Quantum Advice and One-Way Communication
- Lossy Trapdoor Functions and Their Applications
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- New approaches for quantum copy-protection
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- On the (im)possibility of obfuscating programs
- One-shot signatures and applications to hybrid quantum/classical authentication
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
- Quantum money from knots
- Return of GGH15: provable security against zeroizing attacks
- Secure software leasing
- Secure software leasing without assumptions
- Semi-quantum money
- Theory of Cryptography
- Watermarking cryptographic capabilities
- Watermarking public-key cryptographic primitives
Cited in
(14)- Public key encryption with secure key leasing
- Public-key watermarking schemes for pseudorandom functions
- Franchised quantum money
- Publicly verifiable deletion from minimal assumptions
- Revocable cryptography from learning with errors
- Semi-quantum copy-protection and more
- Collusion resistant copy-protection for watermarkable functionalities
- Cloning games: a general framework for unclonable primitives
- Watermarking PRFs against quantum adversaries
- Functional encryption with secure key leasing
- Quantum CCA-secure PKE, revisited
- Certified everlasting secure collusion-resistant functional encryption, and more
- Software with certified deletion
- Watermarking PRFs and PKE against quantum adversaries
This page was built for publication: Secure software leasing from standard assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2695623)