Pages that link to "Item:Q5495817"
From MaRDI portal
The following pages link to Witness encryption and its applications (Q5495817):
Displaying 50 items.
- Security definitions on time-lock puzzles (Q831622) (← links)
- Cutting-edge cryptography through the lens of secret sharing (Q1627968) (← links)
- Registration-based encryption: removing private-key generator from IBE (Q1629445) (← links)
- A simple construction of iO for Turing machines (Q1631340) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- An improved affine equivalence algorithm for random permutations (Q1648807) (← links)
- Proofs of Work from worst-case assumptions (Q1673424) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input (Q1688409) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Non-trivial witness encryption and null-iO from standard assumptions (Q1796810) (← links)
- Unbounded multi-party computation from learning with errors (Q2056765) (← links)
- On the CCA compatibility of public-key infrastructure (Q2061956) (← links)
- On succinct arguments and witness encryption from groups (Q2096510) (← links)
- (Commit-and-prove) predictable arguments with privacy (Q2096627) (← links)
- A gapless code-based hash proof system based on RQC and its applications (Q2099170) (← links)
- Towards witness encryption without multilinear maps (Q2104410) (← links)
- Succinct non-interactive secure computation (Q2119013) (← links)
- Three-round secure multiparty computation from black-box two-round oblivious transfer (Q2128560) (← links)
- Succinct non-interactive arguments via linear interactive proofs (Q2136170) (← links)
- Practical witness-key-agreement for blockchain-based dark pools financial trading (Q2147265) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- COA-secure obfuscation and applications (Q2170027) (← links)
- From cryptomania to obfustopia through secret-key functional encryption (Q2175212) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications (Q2179397) (← links)
- Multilinear maps from obfuscation (Q2188963) (← links)
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves (Q2191198) (← links)
- Witness-based searchable encryption (Q2195400) (← links)
- Offline witness encryption with semi-adaptive security (Q2229274) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- The magic of ELFs (Q2318089) (← links)
- Survey of information security (Q2385398) (← links)
- Secret-sharing for NP (Q2397445) (← links)
- Cryptanalysis of multilinear maps from ideal lattices: revisited (Q2407051) (← links)
- Automated analysis of cryptographic assumptions in generic group models (Q2423840) (← links)
- Black-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardness (Q2695641) (← links)
- Disappearing cryptography in the bounded storage model (Q2697865) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Cutting-Edge Cryptography Through the Lens of Secret Sharing (Q2799105) (← links)
- Functional Encryption Without Obfuscation (Q2799106) (← links)
- Candidate indistinguishability obfuscation and functional encryption for all circuits (Q2816296) (← links)
- Offline Witness Encryption (Q2822676) (← links)
- Spooky Encryption and Its Applications (Q2829944) (← links)
- Witness Encryption from Instance Independent Assumptions (Q2874518) (← links)
- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography (Q2941198) (← links)
- Secret Sharing for mNP: Completeness Results (Q3179496) (← links)