Key homomorphic PRFs and their applications
From MaRDI portal
Publication:2845686
DOI10.1007/978-3-642-40041-4_23zbMATH Open1310.94129OpenAlexW2154059840MaRDI QIDQ2845686FDOQ2845686
Dan Boneh, Hart Montgomery, Kevin Lewi, Ananth Raghunathan
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_23
Recommendations
Cited In (93)
- Quantum algorithms for the \(k\)-XOR problem
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Homomorphic public-key cryptosystems and encrypting Boolean circuits
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Private Puncturable PRFs from Standard Lattice Assumptions
- Indistinguishability Obfuscation: From Approximate to Exact
- Pseudorandom Functions: Three Decades Later
- Cryptanalysis of the CLT13 multilinear map
- Watermarking Cryptographic Capabilities
- CNF-FSS and Its Applications
- A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
- Adaptively secure distributed PRFs from LWE
- Exploring crypto dark matter: new simple PRF candidates and their applications
- Return of GGH15: provable security against zeroizing attacks
- Traitor-tracing from LWE made simple and attribute-based
- Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices
- Watermarking cryptographic functionalities from standard lattice assumptions
- Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption
- LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE
- Key-homomorphic pseudorandom functions from LWE with small modulus
- Cryptography with Updates
- Multi-authority ABE from lattices without random oracles
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
- Functional Encryption Without Obfuscation
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Multilinear Maps from Obfuscation
- Traceable ring signatures: general framework and post-quantum security
- Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More
- Lattice-based e-cash, revisited
- On the Correlation Intractability of Obfuscated Pseudorandom Functions
- A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems
- Related-key security for pseudorandom functions beyond the linear barrier
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- Secure multiparty computation with free branching
- Multiparty reusable non-interactive secure computation from LWE
- Updatable public key encryption in the standard model
- Updatable Tokenization: Formal Definitions and Provably Secure Constructions
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices
- Updatable signatures and message authentication codes
- A fast and simple partially oblivious PRF, with applications
- Adaptively secure constrained pseudorandom functions in the standard model
- Fast and secure updatable encryption
- Server-aided private set intersection based on reputation
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Oblivious PRF on committed vector inputs and application to deduplication of encrypted data
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Cryptographic group actions and applications
- Pseudorandom functions in NC class from the standard LWE assumption
- Witness encryption and null-iO from evasive LWE
- CCA updatable encryption against malicious re-encryption attacks
- A combinatorial approach to quantum random functions
- Improving speed and security in updatable encryption schemes
- The direction of updatable encryption does not matter much
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- Cumulatively all-lossy-but-one trapdoor functions from standard assumptions
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Simple and more efficient PRFs with tight security from LWE and matrix-DDH
- Updatable searchable symmetric encryption: definitions and constructions
- Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
- Unidirectional updatable encryption and proxy re-encryption from DDH
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- Distributed Pseudorandom Functions for General Access Structures in NP
- Minicrypt primitives with algebraic structure and applications
- Adaptive distributional security for garbling schemes with \(\mathcal{O}(|x|)\) online complexity
- LERNA: secure single-server aggregation via key-homomorphic masking
- Collusion Resistant Traitor Tracing from Learning with Errors
- ParaDiSE: efficient threshold authenticated encryption in fully malicious model
- No-directional and backward-leak uni-directional updatable encryption are equivalent
- CCA-1 secure updatable encryption with adaptive security
- Efficient secure storage with version control and key rotation
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- \textsf{PERKS}: persistent and distributed key acquisition for secure storage from passwords
- Epoch confidentiality in updatable encryption
- Efficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFs
- Forward-secure encryption with fast forwarding
- Hardness of (M)LWE with semi-uniform seeds
- Compact selective opening security from LWE
- Threshold raccoon: practical threshold signatures from standard lattice assumptions
- Time-lock puzzles with efficient batch solving
- The direction of updatable encryption does matter
- Robust Distributed Pseudorandom Functions for mNP Access Structures
- Compact key storage. A modern approach to key backup and delegation
- Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption
- Circuit ABE with \(\mathsf{poly}(\mathrm{depth},\lambda )\)-sized ciphertexts and keys from lattices
- Two-round threshold signature from algebraic one-more learning with errors
- Backward private dynamic searchable encryption with update pattern
- Adaptively sound zero-knowledge SNARKs for UP
- Cryptographic primitives with hinting property
This page was built for publication: Key homomorphic PRFs and their applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845686)