Pages that link to "Item:Q5738766"
From MaRDI portal
The following pages link to Constraining Pseudorandom Functions Privately (Q5738766):
Displaying 27 items.
- Traitor-tracing from LWE made simple and attribute-based (Q1631335) (← links)
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries (Q1631357) (← links)
- Private information retrieval with sublinear online time (Q2055601) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Collusion resistant watermarkable PRFs from standard assumptions (Q2096500) (← links)
- Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time (Q2139652) (← links)
- Watermarking PRFs against quantum adversaries (Q2170100) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Deniable Attribute Based Encryption for Branching Programs from LWE (Q3181031) (← links)
- Watermarking Cryptographic Capabilities (Q4561266) (← links)
- Constraining and Watermarking PRFs from Milder Assumptions (Q5041166) (← links)
- Traceable PRFs: Full Collusion Resistance and Active Security (Q5087266) (← links)
- Constraining Pseudorandom Functions Privately (Q5738766) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness (Q6085266) (← links)
- Constrained pseudorandom functions from homomorphic secret sharing (Q6085268) (← links)
- Programmable distributed point functions (Q6111543) (← links)
- Puncturable key wrapping and its applications (Q6132430) (← links)
- Watermarkable public key encryption with efficient extraction under standard assumptions (Q6134821) (← links)
- Optimal single-server private information retrieval (Q6138096) (← links)
- Beyond software watermarking: traitor-tracing for pseudorandom functions (Q6157551) (← links)
- Public-key watermarking schemes for pseudorandom functions (Q6162059) (← links)
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption (Q6163657) (← links)
- \textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDH (Q6186714) (← links)