Watermarking PRFs and PKE against quantum adversaries
From MaRDI portal
Publication:6536747
DOI10.1007/S00145-024-09500-XzbMATH Open1539.94035MaRDI QIDQ6536747FDOQ6536747
Authors: Fuyuki Kitagawa, Ryo Nishimaki
Publication date: 13 May 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Public-key cryptosystems from the worst-case shortest vector problem
- Secure identity-based encryption in the quantum random oracle model
- Zero-knowledge against quantum attacks
- A Pseudorandom Generator from any One-way Function
- Bit commitment using pseudorandomness
- Quantum Arthur-Merlin games
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Random oracles in a quantum world
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- On the (im)possibility of obfuscating programs
- Functional encryption with bounded collusions via multi-party computation
- Lossy Trapdoor Functions and Their Applications
- Constrained pseudorandom functions and their applications
- Quantum proofs of knowledge
- Essay on the \(n\) dimensional geometry.
- Return of GGH15: provable security against zeroizing attacks
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Private constrained PRFs (and more) from LWE
- Privately constraining and programming PRFs, the LWE way
- Learning with rounding, revisited. New reduction, properties and applications
- From Weak to Strong Watermarking
- Title not available (Why is that?)
- How to watermark cryptographic functions
- Functional signatures and pseudorandom functions
- Constraining pseudorandom functions privately
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Tighter proofs of CCA security in the quantum random oracle model
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)
- Secure software leasing
- Candidate obfuscation via oblivious LWE sampling
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Watermarking Cryptographic Capabilities
- Collusion resistant watermarkable PRFs from standard assumptions
- New approaches to traitor tracing with embedded identities
- Collusion resistant watermarking schemes for cryptographic functionalities
- Watermarking public-key cryptographic primitives
- Anonymous traitor tracing: how to embed arbitrary information in a key
- Schrödinger's pirate: how to trace a quantum decoder
- New approaches for quantum copy-protection
- Counterexamples to new circular security assumptions underlying iO
- Indistinguishability obfuscation from circular security
- Watermarking PRFs against quantum adversaries
- Secure software leasing from standard assumptions
- Watermarking cryptographic functionalities from standard lattice assumptions
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
- Beyond software watermarking: traitor-tracing for pseudorandom functions
- Public key encryption with secure key leasing
- Public-key watermarking schemes for pseudorandom functions
- Tracing quantum state distinguishers via backtracking
- One-out-of-many unclonable cryptography: definitions, constructions, and more
This page was built for publication: Watermarking PRFs and PKE against quantum adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6536747)