Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE - MaRDI portal

Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE

From MaRDI portal
Publication:5738886

DOI10.1007/978-3-319-56620-7_16zbMath1410.94055OpenAlexW2603265044MaRDI QIDQ5738886

Yilei Chen, Ran Canetti

Publication date: 13 June 2017

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-56620-7_16




Related Items (30)

Constraining and Watermarking PRFs from Milder AssumptionsTraitor-tracing from LWE made simple and attribute-basedReturn of GGH15: provable security against zeroizing attacksWatermarking PRFs under standard assumptions: public marking and security with extraction queriesPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsFaster Gaussian sampling for trapdoor lattices with arbitrary modulusOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessConstrained pseudorandom functions from homomorphic secret sharingProgrammable distributed point functionsAdaptive multiparty NIKEWitness encryption and null-iO from evasive LWEOptimal single-server private information retrievalConstrained (Verifiable) Pseudorandom Function from Functional Encryption\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHAdaptively secure inner product encryption from LWECollusion Resistant Traitor Tracing from Learning with ErrorsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPseudorandom functions in NC class from the standard LWE assumptionPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEWatermarking cryptographic functionalities from standard lattice assumptionsConstrained pseudorandom functions from functional encryptionPrivate information retrieval with sublinear online timeNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsRound-optimal verifiable oblivious pseudorandom functions from ideal latticesAdaptively secure constrained pseudorandom functions in the standard modelCollusion resistant watermarkable PRFs from standard assumptionsKey-homomorphic pseudorandom functions from LWE with small modulus


Uses Software


Cites Work




This page was built for publication: Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE