Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input - MaRDI portal

On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input

From MaRDI portal
Publication:2874523

DOI10.1007/978-3-662-44371-2_29zbMath1336.94048OpenAlexW437498863MaRDI QIDQ2874523

Daniel Wichs, Shai Halevi, Craig Gentry, Sanjam Garg

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_29




Related Items (34)

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOThree-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of KnowledgeLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionStandard Security Does Not Imply Indistinguishability Under Selective OpeningSimpler constructions of asymmetric primitives from obfuscationIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsStoring and Retrieving Secrets on a BlockchainPublic-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applicationsSimulation-Based Secure Functional Encryption in the Random Oracle ModelOn Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsMulti-input Functional Encryption with Unbounded-Message SecurityWitness encryption and null-iO from evasive LWEInstantiability of classical random-oracle-model encryption transformsSecurity-preserving distributed samplers: how to generate any CRS in one round without random oraclesDisappearing cryptography in the bounded storage modelLeakage-resilient cryptography from puncturable primitives and obfuscationPredictable Arguments of KnowledgeFully Leakage-Resilient CodesOutput-Compressing Randomized Encodings and ApplicationsPractical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofsHow to build time-lock encryptionHow to Avoid Obfuscation Using Witness PRFsContention in Cryptoland: Obfuscation, Leakage and UCENew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesFour-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for CircuitsAbuse resistant law enforcement access systemsOffline Witness EncryptionSignatures Resilient to Uninvertible LeakageObfuscation CombinersLeakage resilience from program obfuscationThe magic of ELFsThe Magic of ELFsUnnamed ItemPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software




This page was built for publication: On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input