Key Homomorphic PRFs and Their Applications

From MaRDI portal
Publication:2845686

DOI10.1007/978-3-642-40041-4_23zbMath1310.94129OpenAlexW2154059840MaRDI QIDQ2845686

Dan Boneh, Hart Montgomery, Kevin Lewi, Ananth Raghunathan

Publication date: 2 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_23




Related Items (72)

Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreSubtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over latticesTraitor-tracing from LWE made simple and attribute-basedAdaptively secure distributed PRFs from LWEReturn of GGH15: provable security against zeroizing attacksExploring crypto dark matter: new simple PRF candidates and their applicationsQuantum algorithms for the \(k\)-XOR problemAn Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecurityFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsWatermarking Cryptographic CapabilitiesSecure multiparty computation with free branchingOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsCNF-FSS and Its ApplicationsMatrix PRFs: constructions, attacks, and applications to obfuscationKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsUnidirectional updatable encryption and proxy re-encryption from DDHBackward-leak uni-directional updatable encryption from (homomorphic) public key encryptionCryptanalysis of the CLT13 multilinear mapMulti-authority ABE from lattices without random oraclesForward-secure encryption with fast forwardingCumulatively all-lossy-but-one trapdoor functions from standard assumptionsWitness encryption and null-iO from evasive LWEUpdatable searchable symmetric encryption: definitions and constructionsThe direction of updatable encryption does matterParaDiSE: efficient threshold authenticated encryption in fully malicious modelEpoch confidentiality in updatable encryptionNo-directional and backward-leak uni-directional updatable encryption are equivalentEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsHardness of (M)LWE with semi-uniform seedsThe direction of updatable encryption does not matter muchImproving speed and security in updatable encryption schemesCCA updatable encryption against malicious re-encryption attacksLattice-based e-cash, revisitedCryptographic group actions and applicationsA combinatorial approach to quantum random functionsIncremental symmetric puncturable encryption with support for unbounded number of puncturesUpdatable public key encryption in the standard modelSimple and more efficient PRFs with tight security from LWE and matrix-DDHCollusion Resistant Traitor Tracing from Learning with ErrorsDistributed Pseudorandom Functions for General Access Structures in NPBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPseudorandom functions in NC class from the standard LWE assumptionRelated-key security for pseudorandom functions beyond the linear barrierA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWELP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWEPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWECryptography with UpdatesWatermarking cryptographic functionalities from standard lattice assumptionsIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsMultilinear Maps from ObfuscationTraceable ring signatures: general framework and post-quantum securityFunctional Encryption Without ObfuscationServer-aided private set intersection based on reputationAdaptively secure distributed PRFs from \(\mathsf{LWE}\)A Noiseless Key-Homomorphic PRF: Application on Distributed Storage SystemsMinicrypt primitives with algebraic structure and applicationsMultiparty reusable non-interactive secure computation from LWENon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsUpdatable signatures and message authentication codesRound-optimal verifiable oblivious pseudorandom functions from ideal latticesTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsUpdatable Tokenization: Formal Definitions and Provably Secure ConstructionsHomomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data AggregationFast and secure updatable encryptionAdaptively secure constrained pseudorandom functions in the standard modelPseudorandom Functions: Three Decades LaterKey-homomorphic pseudorandom functions from LWE with small modulus




This page was built for publication: Key Homomorphic PRFs and Their Applications