Using Indistinguishability Obfuscation via UCEs
From MaRDI portal
Publication:2936604
DOI10.1007/978-3-662-45608-8_7zbMath1317.94092OpenAlexW122561124MaRDI QIDQ2936604
Arno Mittelbach, Christina Brzuska
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_7
indistinguishability obfuscationdiffering-inputs obfuscationhardcore functionsuniversal computational extractors (UCEs)auxiliary-input obfuscationcorrelation-secure hash functionspoint-function obfuscation
Related Items
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ Beyond Uber: instantiating generic groups via PGGs ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Modeling Random Oracles Under Unpredictable Queries ⋮ Public-Seed Pseudorandom Permutations ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ On the Correlation Intractability of Obfuscated Pseudorandom Functions ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Point-Function Obfuscation: A Framework and Generic Constructions