Shorter Circuit Obfuscation in Challenging Security Models
From MaRDI portal
Publication:2827739
DOI10.1007/978-3-319-44618-9_29zbMath1483.68071OpenAlexW2517571150MaRDI QIDQ2827739
Publication date: 21 October 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-44618-9_29
Cryptography (94A60) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items (2)
Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications ⋮ Shorter Circuit Obfuscation in Challenging Security Models
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24--26, 2014. Proceedings
- Obfuscating Conjunctions under Entropic Ring LWE
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Shorter Circuit Obfuscation in Challenging Security Models
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Practical Multilinear Maps over the Integers
- Obfuscating Conjunctions
- Witness Encryption from Instance Independent Assumptions
- Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
- Cryptanalysis of the Multilinear Map over the Integers
- How to Obfuscate Programs Directly
- Black-box obfuscation for d-CNFs
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- New Multilinear Maps Over the Integers
- Candidate Multilinear Maps from Ideal Lattices
- How to use indistinguishability obfuscation
- Obfuscating Circuits via Composite-Order Graded Encoding
- Protecting Obfuscation against Algebraic Attacks
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Obfuscation for Evasive Functions
- Cryptography and Coding
This page was built for publication: Shorter Circuit Obfuscation in Challenging Security Models