Watermarking PRFs under standard assumptions: public marking and security with extraction queries
From MaRDI portal
Publication:1631357
DOI10.1007/978-3-030-03810-6_24zbMath1430.94084OpenAlexW2898709066MaRDI QIDQ1631357
Willy Quach, Daniel Wichs, Giorgos Zirdelis
Publication date: 6 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-03810-6_24
Related Items
New approaches for quantum copy-protection, Constraining and Watermarking PRFs from Milder Assumptions, Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions, Watermarking PRFs against quantum adversaries, Traceable PRFs: Full Collusion Resistance and Active Security, Watermarkable public key encryption with efficient extraction under standard assumptions, Beyond software watermarking: traitor-tracing for pseudorandom functions, Public-key watermarking schemes for pseudorandom functions, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Watermarking cryptographic functionalities from standard lattice assumptions, CCA security and trapdoor functions via key-dependent-message security, Collusion resistant watermarkable PRFs from standard assumptions, Key-homomorphic pseudorandom functions from LWE with small modulus
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Private constrained PRFs (and more) from LWE
- Privately constraining and programming PRFs, the LWE way
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Constrained Pseudorandom Functions and Their Applications
- Efficient Lattice (H)IBE in the Standard Model
- From Weak to Strong Watermarking
- How to Watermark Cryptographic Functions
- Watermarking cryptographic capabilities
- On the (im)possibility of obfuscating programs
- Functional Signatures and Pseudorandom Functions
- Constraining Pseudorandom Functions Privately
- Private Puncturable PRFs from Standard Lattice Assumptions
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Watermarking cryptographic functionalities from standard lattice assumptions