Watermarkable public key encryption with efficient extraction under standard assumptions
From MaRDI portal
Publication:6134821
DOI10.1007/978-3-031-14791-3_11zbMath1518.94106OpenAlexW4294698947MaRDI QIDQ6134821
Aggelos Kiayias, Katerina Samari, Foteini Baldimtsi
Publication date: 25 July 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-14791-3_11
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)
- Collusion resistant watermarkable PRFs from standard assumptions
- Optimal bounded-collusion secure functional encryption
- New approaches to traitor tracing with embedded identities
- Collusion resistant watermarking schemes for cryptographic functionalities
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Watermarking public-key cryptographic primitives
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Watermarking Cryptographic Capabilities
- How to Watermark Cryptographic Functions
- Collusion resistant traitor tracing from learning with errors
- How to use indistinguishability obfuscation
- Watermarking cryptographic capabilities
- Group Encryption
- On the (im)possibility of obfuscating programs
- Constraining Pseudorandom Functions Privately
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Scalable public-key tracing and revoking
- Watermarking cryptographic functionalities from standard lattice assumptions
- Watermarkable public key encryption with efficient extraction under standard assumptions
This page was built for publication: Watermarkable public key encryption with efficient extraction under standard assumptions