Adaptively secure puncturable pseudorandom functions in the standard model
From MaRDI portal
Publication:2811126
Recommendations
Cited in
(18)- Adaptive multiparty NIKE
- Constraining pseudorandom functions privately
- Private puncturable PRFs from standard lattice assumptions
- \textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDH
- Backward private dynamic searchable encryption with update pattern
- Verifiable random functions from non-interactive witness-indistinguishable proofs
- Private information retrieval with sublinear online time
- From non-adaptive to adaptive pseudorandom functions
- Constrained pseudorandom functions for unconstrained inputs revisited: achieving verifiability and key delegation
- Adaptively secure constrained pseudorandom functions in the standard model
- A punctured programming approach to adaptively secure functional encryption
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Adaptively secure puncturable pseudorandom functions via puncturable identity-based KEMs
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption
- From non-adaptive to adaptive pseudorandom functions
- Constrained pseudorandom functions from functional encryption
This page was built for publication: Adaptively secure puncturable pseudorandom functions in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2811126)