Secure software leasing from standard assumptions
From MaRDI portal
Publication:2695623
DOI10.1007/978-3-030-90459-3_2OpenAlexW3097625932MaRDI QIDQ2695623
Takashi Yamakawa, Ryo Nishimaki, Fuyuki Kitagawa
Publication date: 31 March 2023
Full work available at URL: https://arxiv.org/abs/2010.11186
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Watermarking PRFs against quantum adversaries ⋮ Collusion resistant copy-protection for watermarkable functionalities ⋮ Functional encryption with secure key leasing ⋮ Public key encryption with secure key leasing ⋮ Franchised quantum money ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Cloning games: a general framework for unclonable primitives
Cites Work
- Return of GGH15: provable security against zeroizing attacks
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Secure software leasing
- Candidate obfuscation via oblivious LWE sampling
- New approaches for quantum copy-protection
- Counterexamples to new circular security assumptions underlying iO
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- Watermarking public-key cryptographic primitives
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
- Semi-quantum money
- Secure software leasing without assumptions
- Quantum money from knots
- Limitations of Quantum Advice and One-Way Communication
- Quantum money from hidden subspaces
- Lossy Trapdoor Functions and Their Applications
- Watermarking Cryptographic Capabilities
- A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device
- One-shot signatures and applications to hybrid quantum/classical authentication
- On the (im)possibility of obfuscating programs
- Theory of Cryptography
- Indistinguishability obfuscation from circular security