Time-Lock Puzzles with Efficient Batch Solving

J Dujmovic, R Garg, G Malavolta - … on the Theory and Applications of …, 2024 - Springer
Abstract Time-Lock Puzzles (TLPs) are a powerful tool for concealing messages until a
predetermined point in time. When solving multiple puzzles, in many cases, it becomes …

Adaptive multiparty nike

V Koppula, B Waters, M Zhandry - Theory of Cryptography Conference, 2022 - Springer
We construct adaptively secure multiparty non-interactive key exchange (NIKE) from
polynomially-hard indistinguishability obfuscation and other standard assumptions. This …

Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness

R Yang - Annual International Conference on the Theory and …, 2023 - Springer
A private puncturable pseudorandom function (PRF) enables one to create a constrained
version of a PRF key, which can be used to evaluate the PRF at all but some punctured …

Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions

S Servan-Schreiber - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In this paper, we build a framework for constructing Constrained Pseudorandom Functions
(CPRFs) with inner-product constraint predicates, using ideas from subtractive secret …

[PDF][PDF] 受限伪随机函数: 定义的讨论和可验证性构造

昝瑶, 李红达, 梁蓓, 孟宪宁 - 信息安全学报 - bimsa.net
摘要伪随机函数(Pseudorandom Function, PRF) 是现代密码学的基本原语之一, 由私钥空间,
定义域空间及值域空间所表达. 一方从私钥空间随机选取一个私钥, 对定义域空间内的任一点 …

Generic Construction of (Hierarchical) Functional Pseudorandom Functions

Y Zan, H Li, X Meng, H Xu - Proceedings of the 2022 3rd International …, 2022 - dl.acm.org
Functional Pseudorandom (F-PRF) is a cryptography primitive which extends the standard
Pseudorandom Function (PRF) to be functional, where for any function f, a functional key …

Outsourcing the unsigncryption of compact attribute-based signcryption for general circuits

F Chen, Y Han, D Jiang, X Li, X Yang - … 2016, Harbin, China, August 20-22 …, 2016 - Springer
In the driven of big data, social computing and information security is undergoing rapid
development and beginning to cross. This paper describes a key-policy attribute-based …

支持通用电路的多线性映射外包属性加密方案

陈飞, 韩益亮, 李晓策, 孙家浩, 杨晓元 - 计算机应用, 2016 - joca.cn
针对基于多线性映射的属性加密方案存在密文扩展率大, 解密效率低, 密钥托管的问题,
将外包技术和用户秘密值法运用于方案中, 设计了一个密钥策略的多线性映射属性加密方案 …