On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
From MaRDI portal
Publication:2874523
DOI10.1007/978-3-662-44371-2_29zbMath1336.94048OpenAlexW437498863MaRDI QIDQ2874523
Daniel Wichs, Shai Halevi, Craig Gentry, Sanjam Garg
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_29
Related Items (34)
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO ⋮ Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge ⋮ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption ⋮ Standard Security Does Not Imply Indistinguishability Under Selective Opening ⋮ Simpler constructions of asymmetric primitives from obfuscation ⋮ Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings ⋮ Storing and Retrieving Secrets on a Blockchain ⋮ Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications ⋮ Simulation-Based Secure Functional Encryption in the Random Oracle Model ⋮ On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits ⋮ Multi-input Functional Encryption with Unbounded-Message Security ⋮ Witness encryption and null-iO from evasive LWE ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Security-preserving distributed samplers: how to generate any CRS in one round without random oracles ⋮ Disappearing cryptography in the bounded storage model ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Predictable Arguments of Knowledge ⋮ Fully Leakage-Resilient Codes ⋮ Output-Compressing Randomized Encodings and Applications ⋮ Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs ⋮ How to build time-lock encryption ⋮ How to Avoid Obfuscation Using Witness PRFs ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries ⋮ Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits ⋮ Abuse resistant law enforcement access systems ⋮ Offline Witness Encryption ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Obfuscation Combiners ⋮ Leakage resilience from program obfuscation ⋮ The magic of ELFs ⋮ The Magic of ELFs ⋮ Unnamed Item ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
This page was built for publication: On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input