Key Homomorphic PRFs and Their Applications
From MaRDI portal
Publication:2845686
DOI10.1007/978-3-642-40041-4_23zbMath1310.94129OpenAlexW2154059840MaRDI QIDQ2845686
Dan Boneh, Hart Montgomery, Kevin Lewi, Ananth Raghunathan
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_23
Related Items (72)
Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More ⋮ Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices ⋮ Traitor-tracing from LWE made simple and attribute-based ⋮ Adaptively secure distributed PRFs from LWE ⋮ Return of GGH15: provable security against zeroizing attacks ⋮ Exploring crypto dark matter: new simple PRF candidates and their applications ⋮ Quantum algorithms for the \(k\)-XOR problem ⋮ An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security ⋮ Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions ⋮ Watermarking Cryptographic Capabilities ⋮ Secure multiparty computation with free branching ⋮ Optimal broadcast encryption and CP-ABE from evasive lattice assumptions ⋮ Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings ⋮ CNF-FSS and Its Applications ⋮ Matrix PRFs: constructions, attacks, and applications to obfuscation ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ Unidirectional updatable encryption and proxy re-encryption from DDH ⋮ Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption ⋮ Cryptanalysis of the CLT13 multilinear map ⋮ Multi-authority ABE from lattices without random oracles ⋮ Forward-secure encryption with fast forwarding ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ Witness encryption and null-iO from evasive LWE ⋮ Updatable searchable symmetric encryption: definitions and constructions ⋮ The direction of updatable encryption does matter ⋮ ParaDiSE: efficient threshold authenticated encryption in fully malicious model ⋮ Epoch confidentiality in updatable encryption ⋮ No-directional and backward-leak uni-directional updatable encryption are equivalent ⋮ Efficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFs ⋮ Hardness of (M)LWE with semi-uniform seeds ⋮ The direction of updatable encryption does not matter much ⋮ Improving speed and security in updatable encryption schemes ⋮ CCA updatable encryption against malicious re-encryption attacks ⋮ Lattice-based e-cash, revisited ⋮ Cryptographic group actions and applications ⋮ A combinatorial approach to quantum random functions ⋮ Incremental symmetric puncturable encryption with support for unbounded number of punctures ⋮ Updatable public key encryption in the standard model ⋮ Simple and more efficient PRFs with tight security from LWE and matrix-DDH ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Distributed Pseudorandom Functions for General Access Structures in NP ⋮ Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Pseudorandom functions in NC class from the standard LWE assumption ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE ⋮ LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE ⋮ Private Puncturable PRFs from Standard Lattice Assumptions ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ Cryptography with Updates ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Indistinguishability Obfuscation: From Approximate to Exact ⋮ On the Correlation Intractability of Obfuscated Pseudorandom Functions ⋮ Multilinear Maps from Obfuscation ⋮ Traceable ring signatures: general framework and post-quantum security ⋮ Functional Encryption Without Obfuscation ⋮ Server-aided private set intersection based on reputation ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems ⋮ Minicrypt primitives with algebraic structure and applications ⋮ Multiparty reusable non-interactive secure computation from LWE ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Updatable signatures and message authentication codes ⋮ Round-optimal verifiable oblivious pseudorandom functions from ideal lattices ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ Updatable Tokenization: Formal Definitions and Provably Secure Constructions ⋮ Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation ⋮ Fast and secure updatable encryption ⋮ Adaptively secure constrained pseudorandom functions in the standard model ⋮ Pseudorandom Functions: Three Decades Later ⋮ Key-homomorphic pseudorandom functions from LWE with small modulus
This page was built for publication: Key Homomorphic PRFs and Their Applications