2021
DOI: 10.1007/978-3-030-90459-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Secure Software Leasing Without Assumptions

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…We test our implementation using the Honest-Malicious security model introduced in [2]. For a correctness check of our password authentication scheme, we use a simplified version of the game in [2]. The game occurs between a challenger and an evaluator.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…We test our implementation using the Honest-Malicious security model introduced in [2]. For a correctness check of our password authentication scheme, we use a simplified version of the game in [2]. The game occurs between a challenger and an evaluator.…”
Section: Introductionmentioning
confidence: 99%
“…The challenger prepares a copy-protected program using p as the key and sends it to an evaluator. The challenger then prepares a challenge input sampled from the challenge distribution given in [2]. This challenge distribution outputs:…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation