Collusion resistant copy-protection for watermarkable functionalities
From MaRDI portal
Publication:6114235
DOI10.1007/978-3-031-22318-1_11zbMath1519.94225MaRDI QIDQ6114235
Jiahui Liu, Luowen Qian, Qipeng Liu, Mark Zhandry
Publication date: 14 August 2023
Published in: Theory of Cryptography (Search for Journal in Brave)
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Quantum Arthur-Merlin games
- Secure software leasing
- Classical proofs of quantum knowledge
- Collusion resistant watermarkable PRFs from standard assumptions
- Schrödinger's pirate: how to trace a quantum decoder
- New approaches for quantum copy-protection
- Hidden cosets and applications to unclonable cryptography
- Collusion resistant watermarking schemes for cryptographic functionalities
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Watermarking public-key cryptographic primitives
- Secure software leasing from standard assumptions
- Secure software leasing without assumptions
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Limitations of Quantum Advice and One-Way Communication
- Quantum Computation and Quantum Information
- Quantum money from hidden subspaces
- Watermarking Cryptographic Capabilities
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
- Watermarking cryptographic functionalities from standard lattice assumptions
- On the feasibility of unclonable encryption, and more
This page was built for publication: Collusion resistant copy-protection for watermarkable functionalities