Private constrained PRFs (and more) from LWE

From MaRDI portal
Publication:1690195

DOI10.1007/978-3-319-70500-2_10zbMath1410.94053OpenAlexW2766553718MaRDI QIDQ1690195

Rotem Tsabary, Hoeteck Wee, Zvika Brakerski, Vinod Vaikuntanathan

Publication date: 19 January 2018

Full work available at URL: https://hdl.handle.net/1721.1/137864




Related Items

Constraining and Watermarking PRFs from Milder AssumptionsTraitor-tracing from LWE made simple and attribute-basedWatermarking PRFs under standard assumptions: public marking and security with extraction queriesPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessConstrained pseudorandom functions from homomorphic secret sharingProgrammable distributed point functionsMulti-authority ABE from lattices without random oraclesABE for circuits with constant-size secret keys and adaptive securityAdaptive multiparty NIKEOptimal single-server private information retrievalBeyond software watermarking: traitor-tracing for pseudorandom functions\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHAdaptively secure inner product encryption from LWESuccinct LWE sampling, random polynomials, and obfuscationExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPseudorandom functions in NC class from the standard LWE assumptionWatermarking cryptographic functionalities from standard lattice assumptionsPrivate information retrieval with sublinear online timeCandidate obfuscation via oblivious LWE samplingRound-optimal verifiable oblivious pseudorandom functions from ideal latticesConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationAdaptively secure constrained pseudorandom functions in the standard modelCollusion resistant watermarkable PRFs from standard assumptionsKey-homomorphic pseudorandom functions from LWE with small modulus