Functional encryption with secure key leasing
From MaRDI portal
Publication:6134000
DOI10.1007/978-3-031-22972-5_20zbMath1524.68122arXiv2209.13081OpenAlexW4317928310MaRDI QIDQ6134000
Ryo Nishimaki, Fuyuki Kitagawa
Publication date: 21 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2209.13081
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (2)
Quantum attribute-based encryption: a comprehensive study ⋮ Public key encryption with secure key leasing
Cites Work
- Unnamed Item
- Function-private functional encryption in the private-key setting
- Function-hiding inner product encryption is practical
- Secure software leasing
- Threshold garbled circuits and ad hoc secure computation
- Amplifying the security of functional encryption, unconditionally
- Quantum encryption with certified deletion
- New approaches for quantum copy-protection
- Hidden cosets and applications to unclonable cryptography
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Dynamic collusion bounded functional encryption from identity-based encryption
- From cryptomania to obfustopia through secret-key functional encryption
- Optimal bounded-collusion secure functional encryption
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- Secure software leasing from standard assumptions
- Secure software leasing without assumptions
- On the Achievability of Simulation-Based Security for Functional Encryption
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Functional Encryption: Definitions and Challenges
- From Selective to Adaptive Security in Functional Encryption
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
- Fuzzy Identity-Based Encryption
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Two Round Multiparty Computation via Multi-key FHE
- Simple and generic constructions of succinct functional encryption
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
This page was built for publication: Functional encryption with secure key leasing