Weakening assumptions for publicly-verifiable deletion
From MaRDI portal
Publication:6587952
DOI10.1007/978-3-031-48624-1_7MaRDI QIDQ6587952FDOQ6587952
Authors: James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter
Publication date: 15 August 2024
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Theory of compilers and interpreters (68N20)
Cites Work
- Coding theorem and strong converse for quantum channels
- Pseudorandom quantum states
- Reducing complexity assumptions for statistically-hiding commitment
- Revocable Quantum Timed-Release Encryption
- Quantum commitments and signatures without one-way functions
- Quantum encryption with certified deletion
- Title not available (Why is that?)
- Certified everlasting zero-knowledge proof for QMA
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
- Public key encryption with secure key leasing
- Publicly-verifiable deletion via target-collapsing functions
- Quantum cryptography in Algorithmica
Cited In (1)
This page was built for publication: Weakening assumptions for publicly-verifiable deletion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6587952)