Public-Coin Differing-Inputs Obfuscation and Its Applications
From MaRDI portal
Publication:5261695
DOI10.1007/978-3-662-46497-7_26zbMath1336.94054OpenAlexW841739680MaRDI QIDQ5261695
Amit Sahai, Omkant Pandey, Yuval Ishai
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_26
Related Items (24)
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO ⋮ Standard Security Does Not Imply Indistinguishability Under Selective Opening ⋮ Simpler constructions of asymmetric primitives from obfuscation ⋮ Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications ⋮ On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Unbounded quadratic functional encryption and more from pairings ⋮ Structure-preserving compilers from new notions of obfuscations ⋮ On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input ⋮ Selective-Opening Security in the Presence of Randomness Failures ⋮ Multi-input Functional Encryption with Unbounded-Message Security ⋮ The pseudorandom oracle model and ideal obfuscation ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Random walks and concurrent zero-knowledge ⋮ Strongly full-hiding inner product encryption ⋮ Output-Compressing Randomized Encodings and Applications ⋮ Functional Encryption for Turing Machines ⋮ Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits ⋮ Adaptively secure MPC with sublinear communication complexity ⋮ Constrained PRFs for Unbounded Inputs with Short Keys ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Leakage resilience from program obfuscation ⋮ Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
This page was built for publication: Public-Coin Differing-Inputs Obfuscation and Its Applications