Software with certified deletion
From MaRDI portal
Publication:6637521
DOI10.1007/978-3-031-58737-5_4MaRDI QIDQ6637521
Justin Raizes, Bhaskar Roberts, Dakshita Khurana, Giulio Malavolta, James Bartusek, Vipul Goyal
Publication date: 13 November 2024
Cites Work
- Unnamed Item
- Return of GGH15: provable security against zeroizing attacks
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Secure software leasing
- Classical proofs of quantum knowledge
- Candidate obfuscation via oblivious LWE sampling
- Quantum encryption with certified deletion
- Hidden cosets and applications to unclonable cryptography
- Quantum lightning never strikes the same state twice
- Secure software leasing from standard assumptions
- Secure software leasing without assumptions
- Unclonable encryption, revisited
- Succinct LWE sampling, random polynomials, and obfuscation
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Quantum money from hidden subspaces
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
- Fully homomorphic encryption using ideal lattices
- A single quantum cannot be cloned
- On the (im)possibility of obfuscating programs
- Revocable Quantum Timed-Release Encryption
- New Negative Results on Differing-Inputs Obfuscation
- On Extractability Obfuscation
- On lattices, learning with errors, random linear codes, and cryptography
- Indistinguishability obfuscation from circular security
- Certified everlasting zero-knowledge proof for QMA
- Semi-quantum tokenized signatures
- On the feasibility of unclonable encryption, and more
- Functional encryption with secure key leasing
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
- Cloning games: a general framework for unclonable primitives
- Cryptography with certified deletion
- Factoring and pairings are not necessary for iO: circular-secure LWE suffices
- Quantum proofs of deletion for learning with errors
Related Items (1)
This page was built for publication: Software with certified deletion