Functional Signatures and Pseudorandom Functions

From MaRDI portal
Publication:5402990

DOI10.1007/978-3-642-54631-0_29zbMath1290.94145OpenAlexW1554247779MaRDI QIDQ5402990

Elette Boyle, Ioana Ivan, Shafi Goldwasser

Publication date: 25 March 2014

Published in: Public-Key Cryptography – PKC 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-54631-0_29




Related Items (only showing first 100 items - show all)

Correlated pseudorandomness from expand-accumulate codesPublic-key watermarking schemes for pseudorandom functionsHierarchical Attribute-Based SignaturesConstrained (Verifiable) Pseudorandom Function from Functional EncryptionMoz\(\mathbb{Z}_{2^k}\)arella: efficient vector-OLE and zero-knowledge proofs over \(\mathbb{Z}_{2^k}\)Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscationTraceable policy-based signatures and instantiation from latticesThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOWitness Maps and ApplicationsConstraining and Watermarking PRFs from Milder AssumptionsSilver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codesCutting-edge cryptography through the lens of secret sharingCertifying trapdoor permutations, revisitedA simple construction of iO for Turing machinesFE and iO for Turing machines from minimal assumptionsWatermarking PRFs under standard assumptions: public marking and security with extraction queriesLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionThe GGM Function Family Is a Weakly One-Way Family of FunctionsOn the (In)Security of SNARKs in the Presence of OraclesVerifiable Computation for Randomized AlgorithmIndistinguishability Obfuscation from Compact Functional EncryptionA Quasipolynomial Reduction for Generalized Selective Decryption on TreesFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSingle-Key to Multi-Key Functional Encryption with Polynomial LossSimpler constructions of asymmetric primitives from obfuscationWatermarking Cryptographic CapabilitiesIncompressible cryptographyDistributed (correlation) samplers: how to remove a trusted dealer in one roundBatch-OT with optimal rateIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionKey regression from constrained pseudorandom functionsSimulation-Based Secure Functional Encryption in the Random Oracle ModelAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsSymmetric Key Exchange with Full Forward Security and Robust SynchronizationExplainable argumentsSublinear-communication secure multiparty computation does not require FHEPseudorandom correlation functions from variable-density LPN, revisitedMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationMulti-input Functional Encryption with Unbounded-Message SecurityHow to Generate and Use Universal SamplersPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessConstrained pseudorandom functions from homomorphic secret sharingMultiparty non-interactive key exchange and more from isogenies on elliptic curvesMultimodal private signaturesProtean Signature SchemesFunction-Dependent Commitments for Verifiable Multi-party ComputationProgrammable distributed point functionsIBE with incompressible master secret and small identity secretsAdaptive multiparty NIKEPuncturable key wrapping and its applicationsMemory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesCumulatively all-lossy-but-one trapdoor functions from standard assumptionsSuccinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofsCollusion-resistant functional encryption for RAMsOblivious transfer with constant computational overheadThe power of undirected rewindings for adaptive securityBeyond software watermarking: traitor-tracing for pseudorandom functionsAdaptively secure inner product encryption from LWEThe cost of adaptivity in security games on graphsLeakage-resilient cryptography from puncturable primitives and obfuscationFunctional broadcast encryption with applications to data sharing for cloud storageBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionOffline witness encryption with semi-adaptive securityFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsOn the complexity of compressing obfuscationConstrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key DelegationConstraining Pseudorandom Functions PrivatelyUniversal Samplers with Fast VerificationPredictable Arguments of KnowledgeFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationCryptography with UpdatesPredicate signatures from pair encodings via dual system proof techniqueWatermarking cryptographic functionalities from standard lattice assumptionsVerifiable random functions from non-interactive witness-indistinguishable proofsSimple and generic constructions of succinct functional encryptionIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsPerfect Structure on the Edge of ChaosConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationObfustopia built on secret-key functional encryptionHow to Avoid Obfuscation Using Witness PRFsFunctional Encryption Without ObfuscationConstrained pseudorandom functions from functional encryptionSession resumption protocols and efficient forward security for TLS 1.3 0-RTTPrivate information retrieval with sublinear online timeExtracting randomness from extractor-dependent sourcesBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeConstrained PRFs for Unbounded Inputs with Short KeysOn publicly-accountable zero-knowledge and small shuffle argumentsOn Statistically Secure Obfuscation with Approximate CorrectnessRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumOn the Existence of Extractable One-Way FunctionsLeakage resilience from program obfuscationConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation




This page was built for publication: Functional Signatures and Pseudorandom Functions