Constraining Pseudorandom Functions Privately

From MaRDI portal
Publication:5738766

DOI10.1007/978-3-662-54388-7_17zbMath1400.94124OpenAlexW2592974355MaRDI QIDQ5738766

Kevin Lewi, David J. Wu, Dan Boneh

Publication date: 13 June 2017

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-54388-7_17




Related Items (27)

Constraining and Watermarking PRFs from Milder AssumptionsTraitor-tracing from LWE made simple and attribute-basedWatermarking PRFs under standard assumptions: public marking and security with extraction queriesPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeDeniable Attribute Based Encryption for Branching Programs from LWEWatermarking Cryptographic CapabilitiesWatermarking PRFs against quantum adversariesTraceable PRFs: Full Collusion Resistance and Active SecurityPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessConstrained pseudorandom functions from homomorphic secret sharingProgrammable distributed point functionsPuncturable key wrapping and its applicationsWatermarkable public key encryption with efficient extraction under standard assumptionsOptimal single-server private information retrievalBeyond software watermarking: traitor-tracing for pseudorandom functionsPublic-key watermarking schemes for pseudorandom functionsConstrained (Verifiable) Pseudorandom Function from Functional Encryption\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHConstraining Pseudorandom Functions PrivatelyPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEWatermarking cryptographic functionalities from standard lattice assumptionsConstrained pseudorandom functions from functional encryptionPrivate information retrieval with sublinear online timeConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationAdaptively secure constrained pseudorandom functions in the standard modelCollusion resistant watermarkable PRFs from standard assumptions



Cites Work




This page was built for publication: Constraining Pseudorandom Functions Privately