Watermarking PRFs and PKE against quantum adversaries
From MaRDI portal
Publication:6536747
Recommendations
- Watermarking PRFs against quantum adversaries
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Watermarking cryptographic capabilities
- Watermarking public-key cryptographic primitives
Cites work
- scientific article; zbMATH DE number 1341875 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- Anonymous traitor tracing: how to embed arbitrary information in a key
- Beyond software watermarking: traitor-tracing for pseudorandom functions
- Bit commitment using pseudorandomness
- Candidate obfuscation via oblivious LWE sampling
- Collusion resistant watermarkable PRFs from standard assumptions
- Collusion resistant watermarking schemes for cryptographic functionalities
- Constrained pseudorandom functions and their applications
- Constraining pseudorandom functions privately
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Counterexamples to new circular security assumptions underlying iO
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)
- Essay on the \(n\) dimensional geometry.
- From Weak to Strong Watermarking
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Functional encryption with bounded collusions via multi-party computation
- Functional signatures and pseudorandom functions
- How to record quantum queries, and applications to quantum indifferentiability
- How to use indistinguishability obfuscation: deniable encryption, and more
- How to watermark cryptographic functions
- Indistinguishability obfuscation from circular security
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Learning with rounding, revisited. New reduction, properties and applications
- Lossy Trapdoor Functions and Their Applications
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- New approaches for quantum copy-protection
- New approaches to traitor tracing with embedded identities
- On lattices, learning with errors, random linear codes, and cryptography
- On the (im)possibility of obfuscating programs
- One-out-of-many unclonable cryptography: definitions, constructions, and more
- Private constrained PRFs (and more) from LWE
- Privately constraining and programming PRFs, the LWE way
- Public key encryption with secure key leasing
- Public-key cryptosystems from the worst-case shortest vector problem
- Public-key watermarking schemes for pseudorandom functions
- Quantum Arthur-Merlin games
- Quantum proofs of knowledge
- Quantum security proofs using semi-classical oracles
- Random oracles in a quantum world
- Return of GGH15: provable security against zeroizing attacks
- Schrödinger's pirate: how to trace a quantum decoder
- Secure identity-based encryption in the quantum random oracle model
- Secure software leasing
- Secure software leasing from standard assumptions
- Tighter proofs of CCA security in the quantum random oracle model
- Tracing quantum state distinguishers via backtracking
- Watermarking PRFs against quantum adversaries
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Watermarking cryptographic capabilities
- Watermarking cryptographic functionalities from standard lattice assumptions
- Watermarking public-key cryptographic primitives
This page was built for publication: Watermarking PRFs and PKE against quantum adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6536747)