R3PO: reach-restricted reactive program obfuscation and its applications
From MaRDI portal
Publication:6635820
DOI10.1007/978-3-031-57725-3_3MaRDI QIDQ6635820
Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath
Publication date: 12 November 2024
Cites Work
- Unnamed Item
- Obfuscating finite automata
- Registration-based encryption: removing private-key generator from IBE
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Two-round multiparty secure computation from minimal assumptions
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
- Identity-based encryption from the Diffie-Hellman assumption
- Laconic oblivious transfer and its applications
- From selective IBE to full IBE and selective HIBE
- Security and composition of multiparty cryptographic protocols
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Decentralized policy-hiding ABE with receiver privacy
- Identity-based functional encryption for quadratic functions from lattices
- Registration-based encryption from standard assumptions
- GNUC: a new universal composability framework
- Multi-party functional encryption
- Simplified Universal Composability Framework
- Indistinguishability Obfuscation with Non-trivial Efficiency
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- On Virtual Grey Box Obfuscation for General Circuits
- Constructive Cryptography – A New Paradigm for Security Definitions and Proofs
- Garbled RAM From One-Way Functions
- An equational approach to secure multi-party computation
- Lattice-based FHE as secure as PKE
- Decentralizing Attribute-Based Encryption
- Attribute-Based Encryption for Circuits
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- New notions of security
- Securely Obfuscating Re-encryption
- Multi-authority Attribute Based Encryption
- Nonmalleable Cryptography
- Attribute-Based Encryption with Fast Decryption
- How to Garble RAM Programs?
- How to use indistinguishability obfuscation
- Obfuscation of Probabilistic Circuits and Applications
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Identity-Based Encryption
- On the (im)possibility of obfuscating programs
- Garbled RAM Revisited
- Concurrent zero-knowledge
- Obfuscation for Evasive Functions
- Theory of Cryptography
- Indistinguishability obfuscation from well-founded assumptions
This page was built for publication: R3PO: reach-restricted reactive program obfuscation and its applications