Pages that link to "Item:Q5261669"
From MaRDI portal
The following pages link to Key-Homomorphic Constrained Pseudorandom Functions (Q5261669):
Displayed 15 items.
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- Incremental symmetric puncturable encryption with support for unbounded number of punctures (Q2697484) (← links)
- Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption (Q3297610) (← links)
- Watermarking Cryptographic Capabilities (Q4561266) (← links)
- Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation (Q5738765) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness (Q6085266) (← links)
- Constrained pseudorandom functions from homomorphic secret sharing (Q6085268) (← links)
- Adaptive multiparty NIKE (Q6114272) (← links)
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption (Q6163657) (← links)