Point-Function Obfuscation: A Framework and Generic Constructions
From MaRDI portal
Publication:2799109
DOI10.1007/978-3-662-49099-0_21zbMath1382.94061OpenAlexW2400178274MaRDI QIDQ2799109
Igors Stepanovs, Mihir Bellare
Publication date: 8 April 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49099-0_21
Related Items (10)
Witness authenticating NIZKs and applications ⋮ Another step towards realizing random oracles: non-malleable point obfuscation ⋮ Obfuscated fuzzy Hamming distance and conjunctions from subset product problems ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ On the obfuscatability of quantum point functions ⋮ Public-Seed Pseudorandom Permutations ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Ad Hoc PSM Protocols: Secure Computation Without Coordination
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy
- Contention in Cryptoland: Obfuscation, Leakage and UCE
- Point-Function Obfuscation: A Framework and Generic Constructions
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Deterministic Public-Key Encryption Under Continual Leakage
- Instantiating Random Oracles via UCEs
- Building Lossy Trapdoor Functions from Lossy Encryption
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
- On Virtual Grey Box Obfuscation for General Circuits
- Point Obfuscation and 3-Round Zero-Knowledge
- Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More
- Incremental Deterministic Public-Key Encryption
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Using Indistinguishability Obfuscation via UCEs
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
- A Formal Treatment of Backdoored Pseudorandom Generators
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
- Barriers in cryptography with weak, correlated and leaky sources
- Correlated-Input Secure Hash Functions
- On Symmetric Encryption and Point Obfuscation
- Extractable Perfectly One-Way Functions
- Lossy trapdoor functions and their applications
- More Constructions of Lossy and Correlation-Secure Trapdoor Functions
- On obfuscating point functions
- On Strong Simulation and Composable Point Obfuscation
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- On cryptography with auxiliary input
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
- How to use indistinguishability obfuscation
- On the existence of extractable one-way functions
- Random-Oracle Uninstantiability from Indistinguishability Obfuscation
- Advances in Cryptology - EUROCRYPT 2004
- Chosen Ciphertext Security via UCE
- Obfuscating Point Functions with Multibit Output
- Theory of Cryptography
- On Extractability Obfuscation
- Chosen Ciphertext Security via Point Obfuscation
This page was built for publication: Point-Function Obfuscation: A Framework and Generic Constructions