On perfect correctness in (lockable) obfuscation
From MaRDI portal
Publication:2055721
DOI10.1007/978-3-030-64375-1_9zbMath1479.94321OpenAlexW2978083886MaRDI QIDQ2055721
Satyanarayana Vusirikala, Venkata Koppula, Brent Waters, Rishab Goyal
Publication date: 1 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-64375-1_9
Related Items (32)
Impossibility of quantum virtual black-box obfuscation of classical circuits ⋮ New approaches for quantum copy-protection ⋮ Hidden cosets and applications to unclonable cryptography ⋮ Obfuscating finite automata ⋮ White box traitor tracing ⋮ Simpler constructions of asymmetric primitives from obfuscation ⋮ Decentralized policy-hiding ABE with receiver privacy ⋮ Obfuscated fuzzy Hamming distance and conjunctions from subset product problems ⋮ New approaches to traitor tracing with embedded identities ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Structure-preserving compilers from new notions of obfuscations ⋮ Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract) ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ mrNISC from LWE with polynomial modulus ⋮ Witness encryption and null-iO from evasive LWE ⋮ Universal amplification of KDM security: from 1-key circular to multi-key KDM ⋮ Multi-input attribute based encryption and predicate encryption ⋮ Augmented random oracles ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Post-quantum insecurity from LWE ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Nonmalleable digital lockers and robust fuzzy extractors in the plain model ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Post-quantum multi-party computation ⋮ Secure software leasing ⋮ A performance evaluation of pairing-based broadcast encryption systems ⋮ (Commit-and-prove) predictable arguments with privacy ⋮ Weak Zero-Knowledge beyond the Black-Box Barrier
This page was built for publication: On perfect correctness in (lockable) obfuscation