Weakening Assumptions for Publicly-Verifiable DeletionIACR Cryptology ePrint Archive (IACR ePrint), 2023 |
Publicly-Verifiable Deletion via Target-Collapsing FunctionsIACR Cryptology ePrint Archive (IACR ePrint), 2023 |
Public Key Encryption with Secure Key LeasingIACR Cryptology ePrint Archive (IACR ePrint), 2023 |
Cryptography with Certified DeletionIACR Cryptology ePrint Archive (IACR ePrint), 2022 |