Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
From MaRDI portal
Publication:5739222
DOI10.1007/978-3-662-49896-5_27zbMath1371.94622OpenAlexW2434338136MaRDI QIDQ5739222
Eric Miles, Amit Sahai, Mark Zhandry, Saikrishna Badrinarayanan
Publication date: 15 July 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49896-5_27
Related Items (21)
One-Way Functions and (Im)perfect Obfuscation ⋮ The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks ⋮ Return of GGH15: provable security against zeroizing attacks ⋮ Strong Hardness of Privacy from Weak Traitor Tracing ⋮ Secure Obfuscation in a Weak Multilinear Map Model ⋮ Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation ⋮ Cryptanalysis of the CLT13 multilinear map ⋮ Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \) ⋮ Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation ⋮ Indistinguishability obfuscation ⋮ Offline witness encryption with semi-adaptive security ⋮ Efficient obfuscation for CNF circuits and applications in cloud computing ⋮ Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 ⋮ On the Correlation Intractability of Obfuscated Pseudorandom Functions ⋮ Obfustopia built on secret-key functional encryption ⋮ Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification ⋮ Shorter Circuit Obfuscation in Challenging Security Models ⋮ Obfuscation Combiners ⋮ Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 ⋮ Lattice-Based SNARGs and Their Application to More Efficient Obfuscation ⋮ Cryptanalyses of Candidate Branching Program Obfuscators
This page was built for publication: Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits