Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Obfuscating Circuits via Composite-Order Graded Encoding - MaRDI portal

Obfuscating Circuits via Composite-Order Graded Encoding

From MaRDI portal
Publication:5261690

DOI10.1007/978-3-662-46497-7_21zbMath1382.94049OpenAlexW2169673773MaRDI QIDQ5261690

Zvika Brakerski, Benny Applebaum

Publication date: 6 July 2015

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_21




Related Items (30)

Cutting-edge cryptography through the lens of secret sharingCompactness vs Collusion Resistance in Functional EncryptionIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Multilinear maps from obfuscationOn virtual grey box obfuscation for general circuitsHardness of Continuous Local Search: Query Complexity and Cryptographic Lower BoundsPractical Order-Revealing Encryption with Limited LeakageObfuscating conjunctionsOn the complexity of compressing obfuscationConstraining Pseudorandom Functions PrivatelyUniversal Samplers with Fast VerificationZeroizing Attacks on Indistinguishability Obfuscation over CLT13Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsImpossibility of VBB Obfuscation with Ideal Constant-Degree Graded EncodingsIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsMultilinear Maps from ObfuscationPerfect Structure on the Edge of ChaosHow to Avoid Obfuscation Using Witness PRFsCutting-Edge Cryptography Through the Lens of Secret SharingConstrained pseudorandom functions from functional encryptionNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEShorter Circuit Obfuscation in Challenging Security ModelsRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program Obfuscators




This page was built for publication: Obfuscating Circuits via Composite-Order Graded Encoding