New and Improved Key-Homomorphic Pseudorandom Functions

From MaRDI portal
Publication:2874514

DOI10.1007/978-3-662-44371-2_20zbMath1314.94053OpenAlexW2105994318MaRDI QIDQ2874514

Chris Peikert, Abhishek Banerjee

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_20




Related Items (35)

Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a ServiceLimits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangeConstraining and Watermarking PRFs from Milder AssumptionsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreAdaptively secure distributed PRFs from LWEExploring crypto dark matter: new simple PRF candidates and their applicationsQuantum algorithms for the \(k\)-XOR problemFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsNon-commutative ring learning with errors from cyclic algebrasKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionQuantum-resistant password-based threshold single-sign-on authentication with updatable server private keyCumulatively all-lossy-but-one trapdoor functions from standard assumptionsEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsImproving speed and security in updatable encryption schemesLattice-based e-cash, revisitedTwo-round maliciously secure computation with super-polynomial simulationDirect computation of branching programs and its applications to more efficient lattice-based cryptographySimple and more efficient PRFs with tight security from LWE and matrix-DDHBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPseudorandom functions in NC class from the standard LWE assumptionRelated-key security for pseudorandom functions beyond the linear barrierPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEWatermarking cryptographic functionalities from standard lattice assumptionsAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Limits on the efficiency of (ring) LWE-based non-interactive key exchangeA Noiseless Key-Homomorphic PRF: Application on Distributed Storage SystemsMultiparty reusable non-interactive secure computation from LWEUpdatable signatures and message authentication codesRound-optimal verifiable oblivious pseudorandom functions from ideal latticesAdaptively secure constrained pseudorandom functions in the standard modelPseudorandom Functions: Three Decades LaterKey-homomorphic pseudorandom functions from LWE with small modulus




This page was built for publication: New and Improved Key-Homomorphic Pseudorandom Functions