Pages that link to "Item:Q5259583"
From MaRDI portal
The following pages link to How to use indistinguishability obfuscation (Q5259583):
Displaying 50 items.
- On the multi-user security of short Schnorr signatures with preprocessing (Q2170064) (← links)
- Dynamic collusion bounded functional encryption from identity-based encryption (Q2170069) (← links)
- From cryptomania to obfustopia through secret-key functional encryption (Q2175212) (← links)
- From minicrypt to obfustopia via private-key functional encryption (Q2175213) (← links)
- Optimal bounded-collusion secure functional encryption (Q2175911) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Deniable searchable symmetric encryption (Q2293186) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- The magic of ELFs (Q2318089) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Survey of information security (Q2385398) (← links)
- Secret-sharing for NP (Q2397445) (← links)
- On constructing one-way permutations from indistinguishability obfuscation (Q2413613) (← links)
- Toward non-interactive zero-knowledge proofs for NP from LWE (Q2661693) (← links)
- Security reductions for white-box key-storage in mobile payments (Q2692343) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)
- Short attribute-based signatures for arbitrary Turing machines from standard assumptions (Q2701493) (← links)
- Lower Bounds on Assumptions Behind Indistinguishability Obfuscation (Q2796118) (← links)
- Indistinguishability Obfuscation: From Approximate to Exact (Q2796119) (← links)
- Output-Compressing Randomized Encodings and Applications (Q2796121) (← links)
- On the Correlation Intractability of Obfuscated Pseudorandom Functions (Q2796135) (← links)
- Reconfigurable Cryptography: A Flexible Approach to Long-Term Security (Q2796136) (← links)
- Perfect Structure on the Edge of Chaos (Q2796138) (← links)
- CCA-Secure Keyed-Fully Homomorphic Encryption (Q2798772) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Cutting-Edge Cryptography Through the Lens of Secret Sharing (Q2799105) (← links)
- On Constructing One-Way Permutations from Indistinguishability Obfuscation (Q2799107) (← links)
- Contention in Cryptoland: Obfuscation, Leakage and UCE (Q2799108) (← links)
- Point-Function Obfuscation: A Framework and Generic Constructions (Q2799109) (← links)
- Constrained PRFs for Unbounded Inputs with Short Keys (Q2822688) (← links)
- Fiat–Shamir for Highly Sound Protocols Is Instantiable (Q2827720) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Shorter Circuit Obfuscation in Challenging Security Models (Q2827739) (← links)
- Bounded KDM Security from iO and OWF (Q2827740) (← links)
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption (Q2829226) (← links)
- On Statistically Secure Obfuscation with Approximate Correctness (Q2829230) (← links)
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium (Q2829231) (← links)
- On the existence of extractable one-way functions (Q2829449) (← links)
- Quantum Homomorphic Encryption for Polynomial-Sized Circuits (Q2829941) (← links)
- Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems (Q2829945) (← links)
- Fine-Grained Cryptography (Q2829959) (← links)
- How to Generate and Use Universal Samplers (Q2953794) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption (Q3179266) (← links)
- The GGM Function Family Is a Weakly One-Way Family of Functions (Q3179353) (← links)
- Strong Hardness of Privacy from Weak Traitor Tracing (Q3179374) (← links)
- Receiver Selective Opening Security from Indistinguishability Obfuscation (Q3179497) (← links)
- Deniable Attribute Based Encryption for Branching Programs from LWE (Q3181031) (← links)