Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory - MaRDI portal

Indistinguishability Obfuscation for Turing Machines with Unbounded Memory

From MaRDI portal
Publication:2941534

DOI10.1145/2746539.2746614zbMath1321.94069OpenAlexW2039677636MaRDI QIDQ2941534

Allison Bishop Lewko, Venkata Koppula, Brent Waters

Publication date: 21 August 2015

Published in: Proceedings of the forty-seventh annual ACM symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2746539.2746614



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (40)

A simple construction of iO for Turing machinesSuccinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsNon-interactive batch arguments for NP from standard assumptionsDelegating RAM Computations with Adaptive Soundness and PrivacyAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseAnonymous IBE, leakage resilience and circular security from new assumptionsCryptanalysis of candidate obfuscators for affine determinant programsSNARGs for P from sub-exponential DDH and QRIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionLaconic function evaluation for Turing machinesMulti-input Functional Encryption with Unbounded-Message SecurityMemory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesCollusion-resistant functional encryption for RAMsFully succinct batch arguments for \textsf{NP} from indistinguishability obfuscationCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsFully-succinct publicly verifiable delegation from constant-size assumptionsShort attribute-based signatures for arbitrary Turing machines from standard assumptionsStructure Versus Hardness Through the Obfuscation LensConstrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key DelegationRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionNo-signaling linear PCPsOutput-Compressing Randomized Encodings and ApplicationsFunctional Encryption for Turing MachinesPerfect Structure on the Edge of ChaosNo-signaling linear PCPsObfustopia built on secret-key functional encryptionOblivious Parallel RAM and ApplicationsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationObfuscation CombinersOn the Existence of Extractable One-Way FunctionsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationConstant-Round Interactive Proofs for Delegating ComputationFully deniable interactive encryptionGarbled Circuits as Randomized Encodings of Functions: a PrimerPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareLattice-Based SNARGs and Their Application to More Efficient Obfuscation


Uses Software


Cites Work


This page was built for publication: Indistinguishability Obfuscation for Turing Machines with Unbounded Memory