Secure software leasing
From MaRDI portal
Publication:2056750
DOI10.1007/978-3-030-77886-6_17OpenAlexW3173200671MaRDI QIDQ2056750
Rolando L. La Placa, Prabhanjan V. Ananth
Publication date: 8 December 2021
Full work available at URL: https://arxiv.org/abs/2005.05289
Related Items (19)
On the round complexity of secure quantum computation ⋮ Impossibility of quantum virtual black-box obfuscation of classical circuits ⋮ New approaches for quantum copy-protection ⋮ Hidden cosets and applications to unclonable cryptography ⋮ Constructions for quantum indistinguishability obfuscation ⋮ Unclonable polymers and their cryptographic applications ⋮ Watermarking PRFs against quantum adversaries ⋮ On the feasibility of unclonable encryption, and more ⋮ Collusion resistant copy-protection for watermarkable functionalities ⋮ Functional encryption with secure key leasing ⋮ Public key encryption with secure key leasing ⋮ Another round of breaking and making quantum money: how to not build it from lattices, and more ⋮ Cloning games: a general framework for unclonable primitives ⋮ Publicly-verifiable deletion via target-collapsing functions ⋮ Secure software leasing from standard assumptions ⋮ Post-quantum resettably-sound zero knowledge ⋮ Secure software leasing without assumptions ⋮ Unclonable encryption, revisited ⋮ Disappearing cryptography in the bounded storage model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum FHE (almost) as secure as classical
- Candidate iO from homomorphic encryption schemes
- On perfect correctness in (lockable) obfuscation
- Candidate obfuscation via oblivious LWE sampling
- Quantum lightning never strikes the same state twice
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Quantum money from knots
- Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts
- Quantum One-Time Programs
- Quantum money from hidden subspaces
- A Pseudorandom Generator from any One-way Function
- One-shot signatures and applications to hybrid quantum/classical authentication
- Post-quantum zero knowledge in constant rounds
- Weak zero-knowledge beyond the black-box barrier
- On the impossibility of approximate obfuscation and applications to resettable cryptography
- Obfuscation for Evasive Functions
This page was built for publication: Secure software leasing