Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Public-Coin Differing-Inputs Obfuscation and Its Applications - MaRDI portal

Public-Coin Differing-Inputs Obfuscation and Its Applications

From MaRDI portal
Publication:5261695

DOI10.1007/978-3-662-46497-7_26zbMath1336.94054OpenAlexW841739680MaRDI QIDQ5261695

Amit Sahai, Omkant Pandey, Yuval Ishai

Publication date: 6 July 2015

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_26




Related Items (24)

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOStandard Security Does Not Imply Indistinguishability Under Selective OpeningSimpler constructions of asymmetric primitives from obfuscationPublic-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applicationsOn Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsBounded Collusion ABE for TMs from IBEUnbounded quadratic functional encryption and more from pairingsStructure-preserving compilers from new notions of obfuscationsOn the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary inputSelective-Opening Security in the Presence of Randomness FailuresMulti-input Functional Encryption with Unbounded-Message SecurityThe pseudorandom oracle model and ideal obfuscationLeakage-resilient cryptography from puncturable primitives and obfuscationRandom walks and concurrent zero-knowledgeStrongly full-hiding inner product encryptionOutput-Compressing Randomized Encodings and ApplicationsFunctional Encryption for Turing MachinesFour-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for CircuitsAdaptively secure MPC with sublinear communication complexityConstrained PRFs for Unbounded Inputs with Short KeysSignatures Resilient to Uninvertible LeakageLeakage resilience from program obfuscationConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software







This page was built for publication: Public-Coin Differing-Inputs Obfuscation and Its Applications