Pages that link to "Item:Q2056783"
From MaRDI portal
The following pages link to Candidate obfuscation via oblivious LWE sampling (Q2056783):
Displaying 28 items.
- Secure software leasing (Q2056750) (← links)
- Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments (Q2056787) (← links)
- Non-interactive anonymous router (Q2056804) (← links)
- Hidden cosets and applications to unclonable cryptography (Q2120094) (← links)
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration (Q2128558) (← links)
- Counterexamples to new circular security assumptions underlying iO (Q2128580) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Incompressible cryptography (Q2170026) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- Secure software leasing from standard assumptions (Q2695623) (← links)
- Succinct LWE sampling, random polynomials, and obfuscation (Q2697860) (← links)
- On the complexity of compressing obfuscation (Q5918748) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- Candidate iO from homomorphic encryption schemes (Q6109075) (← links)
- Watermarking PRFs and PKE against quantum adversaries (Q6536747) (← links)
- On the (im)plausibility of public-key quantum money from collision-resistant hash functions (Q6562579) (← links)
- Multi-key and multi-input predicate encryption (for conjunctions) from learning with errors (Q6570526) (← links)
- Non-interactive anonymous router with quasi-linear router computation (Q6582211) (← links)
- Revocable cryptography from learning with errors (Q6587947) (← links)
- Registered (inner-product) functional encryption (Q6604926) (← links)
- Distributed broadcast encryption from bilinear groups (Q6604936) (← links)
- On instantiating unleveled fully-homomorphic signatures from falsifiable assumptions (Q6635746) (← links)
- Dynamic collusion functional encryption and multi-authority attribute-based encryption (Q6635893) (← links)
- SoK: learning with errors, circular security, and fully homomorphic encryption (Q6635900) (← links)
- Time-lock puzzles with efficient batch solving (Q6636509) (← links)
- Software with certified deletion (Q6637521) (← links)
- How to construct quantum FHE, generically (Q6652899) (← links)
- Time-lock puzzles from lattices (Q6652906) (← links)