Watermarking cryptographic capabilities

From MaRDI portal
Publication:5361906

DOI10.1145/2897518.2897651zbMath1377.94046OpenAlexW2416910455WikidataQ130969402 ScholiaQ130969402MaRDI QIDQ5361906

Vinod Vaikuntanathan, Justin Holmgren, Aloni Cohen, Ryo Nishimaki, Daniel Wichs

Publication date: 29 September 2017

Published in: Proceedings of the forty-eighth annual ACM symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://hdl.handle.net/1721.1/127690




Related Items (24)

Constraining and Watermarking PRFs from Milder AssumptionsFE and iO for Turing machines from minimal assumptionsWatermarking PRFs under standard assumptions: public marking and security with extraction queriesWhite box traitor tracingFine-grained forward secrecy: allow-list/deny-list encryption and applicationsWatermarking Cryptographic CapabilitiesPuncturable identity-based and attribute-based encryption from latticesCryptanalysis of candidate obfuscators for affine determinant programsTraceable PRFs: Full Collusion Resistance and Active SecurityPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessWatermarkable public key encryption with efficient extraction under standard assumptionsBeyond software watermarking: traitor-tracing for pseudorandom functionsPublic-key watermarking schemes for pseudorandom functionsCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsForward secret encrypted RAM: lower bounds and applicationsConstraining Pseudorandom Functions PrivatelyRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsPrivate Puncturable PRFs from Standard Lattice AssumptionsBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeWatermarking cryptographic functionalities from standard lattice assumptionsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCollusion resistant watermarkable PRFs from standard assumptionsPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software






This page was built for publication: Watermarking cryptographic capabilities