Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
How to use indistinguishability obfuscation - MaRDI portal

How to use indistinguishability obfuscation

From MaRDI portal
Publication:5259583

DOI10.1145/2591796.2591825zbMath1315.94102OpenAlexW1984153141MaRDI QIDQ5259583

Amit Sahai, Brent Waters

Publication date: 26 June 2015

Published in: Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2591796.2591825




Related Items (only showing first 100 items - show all)

One-Way Functions and (Im)perfect ObfuscationA New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOWitness Maps and ApplicationsConstraining and Watermarking PRFs from Milder AssumptionsThe Journey from NP to TFNP HardnessFast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)Single-Key to Multi-Key Functional Encryption with Polynomial LossCompactness vs Collusion Resistance in Functional EncryptionDesigning Proof of Human-Work Puzzles for Cryptocurrency and BeyondWatermarking Cryptographic CapabilitiesIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsSymmetric Key Exchange with Full Forward Security and Robust SynchronizationExplainable argumentsA map of witness maps: new definitions and connectionsStructure-preserving compilers from new notions of obfuscationsWhite-box cryptography with global device binding from message-recoverable signatures and token-based obfuscationSuccinct classical verification of quantum computationBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreNIZK from SNARGsVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Adaptive multiparty NIKEPuncturable key wrapping and its applicationsOn access control encryption without sanitizationWatermarkable public key encryption with efficient extraction under standard assumptionsCollusion-resistant functional encryption for RAMsPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)(Inner-product) functional encryption with updatable ciphertextsSNARGs for monotone policy batch NPThe pseudorandom oracle model and ideal obfuscationBeyond software watermarking: traitor-tracing for pseudorandom functionsSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?The final nail in the coffin of statistically-secure obfuscatorPublic-key watermarking schemes for pseudorandom functionsConstrained (Verifiable) Pseudorandom Function from Functional EncryptionA new approach to efficient non-malleable zero-knowledgeSteganography-free zero-knowledgeFully succinct batch arguments for \textsf{NP} from indistinguishability obfuscationSubverting deniabilityUniversal ring signatures in the standard modelInstantiability of classical random-oracle-model encryption transformsNonmalleable digital lockers and robust fuzzy extractors in the plain modelImpossibilities in succinct arguments: black-box extraction and moreStreaming functional encryptionHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreA note on non-interactive zero-knowledge from CDHIndistinguishability obfuscationA Plausibly Deniable Encryption Scheme Utilizing PUF’s Thermo-SensitivityStructure Versus Hardness Through the Obfuscation LensOn the complexity of compressing obfuscationBetter Two-Round Adaptive Multi-party ComputationConstrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key DelegationConstraining Pseudorandom Functions PrivatelyUniversal Samplers with Fast VerificationSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsPrivate Puncturable PRFs from Standard Lattice AssumptionsOn Removing Graded Encodings from Functional EncryptionGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationCryptography with UpdatesCandidate iO from homomorphic encryption schemesDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessVerifiable random functions from non-interactive witness-indistinguishable proofsSimple and generic constructions of succinct functional encryptionMulti-theorem preprocessing NIZKs from latticesConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsCan PPAD hardness be based on standard cryptographic assumptions?Session resumption protocols and efficient forward security for TLS 1.3 0-RTTAdaptively secure MPC with sublinear communication complexityUnnamed ItemThe Complexity of Public-Key CryptographyPseudorandom Functions: Three Decades LaterPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareBreaking the Sub-Exponential Barrier in ObfustopiaLattice-Based SNARGs and Their Application to More Efficient ObfuscationHidden cosets and applications to unclonable cryptographyDeniable fully homomorphic encryption from learning with errorsCutting-edge cryptography through the lens of secret sharingCertifying trapdoor permutations, revisitedUpgrading to functional encryptionA simple construction of iO for Turing machinesSuccinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksAn efficient structural attack on NIST submission DAGSFiat-Shamir for highly sound protocols is instantiableLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionThe GGM Function Family Is a Weakly One-Way Family of FunctionsStrong Hardness of Privacy from Weak Traitor TracingReceiver Selective Opening Security from Indistinguishability ObfuscationConstructions for quantum indistinguishability obfuscationDeniable Attribute Based Encryption for Branching Programs from LWESurvey of information securitySimpler constructions of asymmetric primitives from obfuscationOn the bit security of cryptographic primitivesShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs


Uses Software


Cites Work


This page was built for publication: How to use indistinguishability obfuscation