Adaptive Security of Constrained PRFs
From MaRDI portal
Publication:2936602
DOI10.1007/978-3-662-45608-8_5zbMath1317.94107OpenAlexW72755672MaRDI QIDQ2936602
Vanishree Rao, Krzysztof Pietrzak, Momchil Konstantinov, Georg Fuchsbauer
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_5
Related Items (19)
Adaptive Security of Yao’s Garbled Circuits ⋮ Towards Non-Black-Box Separations of Public Key Encryption and One Way Function ⋮ Simpler constructions of asymmetric primitives from obfuscation ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness ⋮ Adaptive multiparty NIKE ⋮ Puncturable key wrapping and its applications ⋮ The power of undirected rewindings for adaptive security ⋮ Constrained (Verifiable) Pseudorandom Function from Functional Encryption ⋮ The cost of adaptivity in security games on graphs ⋮ Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation ⋮ Private Puncturable PRFs from Standard Lattice Assumptions ⋮ Constrained pseudorandom functions from functional encryption ⋮ Compact NIZKs from standard assumptions on bilinear maps ⋮ Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation ⋮ Security analysis and improvements for the IETF MLS standard for group messaging ⋮ Adaptively secure constrained pseudorandom functions in the standard model ⋮ Black-box use of one-way functions is useless for optimal fair coin-tossing
This page was built for publication: Adaptive Security of Constrained PRFs