Publicly verifiable deletion from minimal assumptions
From MaRDI portal
Publication:6587954
DOI10.1007/978-3-031-48624-1_9zbMATH Open1545.94069MaRDI QIDQ6587954
Ryo Nishimaki, Fuyuki Kitagawa, Takashi Yamakawa
Publication date: 15 August 2024
Cryptography (94A60) Theory of compilers and interpreters (68N20) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Long-term security and universal composability
- Secure software leasing
- Quantum encryption with certified deletion
- New approaches for quantum copy-protection
- Hidden cosets and applications to unclonable cryptography
- Secure software leasing from standard assumptions
- Secure software leasing without assumptions
- How to Run Turing Machines on Encrypted Data
- Revocable Quantum Timed-Release Encryption
- One-shot signatures and applications to hybrid quantum/classical authentication
- On the (im)possibility of obfuscating programs
- Certified everlasting zero-knowledge proof for QMA
- Functional encryption with secure key leasing
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
- Publicly-verifiable deletion via target-collapsing functions
- Quantum proofs of deletion for learning with errors
Related Items (2)
Certified everlasting secure collusion-resistant functional encryption, and more ⋮ Secret sharing with certified deletion
This page was built for publication: Publicly verifiable deletion from minimal assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6587954)