Key-homomorphic constrained pseudorandom functions
From MaRDI portal
Publication:5261669
DOI10.1007/978-3-662-46497-7_2zbMATH Open1315.94052OpenAlexW2234439753MaRDI QIDQ5261669FDOQ5261669
Krzysztof Pietrzak, Abhishek Banerjee, Chris Peikert, Georg Fuchsbauer, Sophie Stevens
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://repository.ist.ac.at/679/1/180.pdf
Recommendations
Cited In (21)
- Constrained Pseudorandom Functions for Unconstrained Inputs
- Private Puncturable PRFs from Standard Lattice Assumptions
- Watermarking Cryptographic Capabilities
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Watermarking cryptographic functionalities from standard lattice assumptions
- Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption
- Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption
- Adaptive multiparty NIKE
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Time-lock puzzles with efficient batch solving
- Pseudorandom functions from LWE: RKA security and application
- Adaptively secure constrained pseudorandom functions in the standard model
- Constrained pseudorandom functions from homomorphic secret sharing
- Backward private dynamic searchable encryption with update pattern
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Constrained pseudorandom functions from functional encryption
- Key regression from constrained pseudorandom functions
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
This page was built for publication: Key-homomorphic constrained pseudorandom functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261669)