Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Perfect Structure on the Edge of Chaos - MaRDI portal

Perfect Structure on the Edge of Chaos

From MaRDI portal
Publication:2796138

DOI10.1007/978-3-662-49096-9_20zbMath1382.94070OpenAlexW2293639154MaRDI QIDQ2796138

Nir Bitansky, Daniel Wichs, Omer Paneth

Publication date: 23 March 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49096-9_20




Related Items (23)

Enhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutationsCertifying trapdoor permutations, revisitedThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionStrong Hardness of Privacy from Weak Traitor TracingOn constructing one-way permutations from indistinguishability obfuscationThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesStructure Versus Hardness Through the Obfuscation LensOn the complexity of compressing obfuscationInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessObfustopia built on secret-key functional encryptionOn Constructing One-Way Permutations from Indistinguishability ObfuscationCan PPAD hardness be based on standard cryptographic assumptions?Compact designated verifier NIZKs from the CDH assumption without pairingsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECompact NIZKs from standard assumptions on bilinear mapsBounded KDM Security from iO and OWFFully deniable interactive encryptionBreaking the Sub-Exponential Barrier in ObfustopiaLattice-Based SNARGs and Their Application to More Efficient Obfuscation



Cites Work


This page was built for publication: Perfect Structure on the Edge of Chaos