Collusion resistant watermarkable PRFs from standard assumptions
From MaRDI portal
Publication:2096500
DOI10.1007/978-3-030-56784-2_20zbMath1503.94044OpenAlexW3037149233MaRDI QIDQ2096500
Rupeng Yang, Qiuliang Xu, Zuoxia Yu, Man Ho Au
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_20
Related Items (7)
Watermarking PRFs against quantum adversaries ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness ⋮ Collusion resistant copy-protection for watermarkable functionalities ⋮ Watermarkable public key encryption with efficient extraction under standard assumptions ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Public-key watermarking schemes for pseudorandom functions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An improvement of discrete Tardos fingerprinting codes
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Private constrained PRFs (and more) from LWE
- Privately constraining and programming PRFs, the LWE way
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Unforgeable watermarking schemes with public extraction
- Collusion resistant watermarking schemes for cryptographic functionalities
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Watermarking public-key cryptographic primitives
- Optimal symmetric Tardos traitor tracing schemes
- Constrained Pseudorandom Functions and Their Applications
- From Weak to Strong Watermarking
- Collusion-secure fingerprinting for digital data
- How to Watermark Cryptographic Functions
- Watermarking cryptographic capabilities
- Functional Signatures and Pseudorandom Functions
- Constraining Pseudorandom Functions Privately
- Private Puncturable PRFs from Standard Lattice Assumptions
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Optimal probabilistic fingerprint codes
- Watermarking cryptographic functionalities from standard lattice assumptions
This page was built for publication: Collusion resistant watermarkable PRFs from standard assumptions