Secure software leasing without assumptions
From MaRDI portal
Publication:2695627
DOI10.1007/978-3-030-90459-3_4OpenAlexW3214056835MaRDI QIDQ2695627
Anne Broadbent, Aarthi Sundaram, Supartha Podder, Stacey Jeffery, Sébastien Lord
Publication date: 31 March 2023
Full work available at URL: https://arxiv.org/abs/2101.12739
Related Items (8)
New approaches for quantum copy-protection ⋮ On the feasibility of unclonable encryption, and more ⋮ Collusion resistant copy-protection for watermarkable functionalities ⋮ Functional encryption with secure key leasing ⋮ Public key encryption with secure key leasing ⋮ Cloning games: a general framework for unclonable primitives ⋮ Secure software leasing from standard assumptions ⋮ Unclonable encryption, revisited
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Quantum cryptography beyond quantum key distribution
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Quantum non-malleability and authentication
- New security notions and feasibility results for authentication of quantum data
- Secure software leasing
- New approaches for quantum copy-protection
- Actively Secure Two-Party Evaluation of Any Quantum Operation
- Quantum money from hidden subspaces
- The Theory of Quantum Information
- A single quantum cannot be cloned
This page was built for publication: Secure software leasing without assumptions