Key-Homomorphic Constrained Pseudorandom Functions
From MaRDI portal
Publication:5261669
DOI10.1007/978-3-662-46497-7_2zbMath1315.94052OpenAlexW2234439753MaRDI QIDQ5261669
Krzysztof Pietrzak, Abhishek Banerjee, Chris Peikert, Georg Fuchsbauer, Sophie Stevens
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://repository.ist.ac.at/679/1/180.pdf
Related Items (15)
Watermarking Cryptographic Capabilities ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness ⋮ Constrained pseudorandom functions from homomorphic secret sharing ⋮ Adaptive multiparty NIKE ⋮ Constrained (Verifiable) Pseudorandom Function from Functional Encryption ⋮ Incremental symmetric puncturable encryption with support for unbounded number of punctures ⋮ Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation ⋮ Private Puncturable PRFs from Standard Lattice Assumptions ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Constrained pseudorandom functions from functional encryption ⋮ Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation ⋮ Adaptively secure constrained pseudorandom functions in the standard model
This page was built for publication: Key-Homomorphic Constrained Pseudorandom Functions