메뉴 건너뛰기




Volumn 8043 LNCS, Issue PART 2, 2013, Pages 416-434

Obfuscating conjunctions

Author keywords

[No Author keywords available]

Indexed keywords

CONJUNCTION FUNCTIONS; DIFFIE-HELLMAN ASSUMPTION; INPUT-OUTPUT; MULTILINEAR MAPS;

EID: 84884472198     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40084-1_24     Document Type: Conference Paper
Times cited : (34)

References (27)
  • 1
    • 38049032820 scopus 로고    scopus 로고
    • How to shuffle in public
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Adida, B., Wikström, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 555-574
    • Adida, B.1    Wikström, D.2
  • 3
    • 84884495815 scopus 로고    scopus 로고
    • CRYPTO 2001
    • Preliminary version in: Springer, Heidelberg
    • Preliminary version in: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Kilian, J.1
  • 4
    • 77957007880 scopus 로고    scopus 로고
    • On strong simulation and composable point obfuscation
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Bitansky, N., Canetti, R.: On strong simulation and composable point obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520-537. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 520-537
    • Bitansky, N.1    Canetti, R.2
  • 5
    • 51849114183 scopus 로고    scopus 로고
    • On notions of security for deterministic encryption, and efficient constructions without random oracles
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Boldyreva, A., Fehr, S., O'Neill, A.: On notions of security for deterministic encryption, and efficient constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 335-359. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 335-359
    • Boldyreva, A.1    Fehr, S.2    O'Neill, A.3
  • 6
  • 7
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 9
    • 0031624874 scopus 로고    scopus 로고
    • Perfectly one-way probabilistic hash functions
    • preliminary version
    • Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions (preliminary version). In: STOC, pp. 131-140 (1998)
    • (1998) STOC , pp. 131-140
    • Canetti, R.1    Micciancio, D.2    Reingold, O.3
  • 10
    • 77949622814 scopus 로고    scopus 로고
    • Obfuscation of hyperplane membership
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Canetti, R., Rothblum, G.N., Varia, M.: Obfuscation of hyperplane membership. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 72-89. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 72-89
    • Canetti, R.1    Rothblum, G.N.2    Varia, M.3
  • 11
    • 84884473382 scopus 로고    scopus 로고
    • Practical multilinear maps over the integers
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
    • Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 476-493. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8042 , pp. 476-493
    • Coron, J.-S.1    Lepoint, T.2    Tibouchi, M.3
  • 12
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008);
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 13
    • 84889576817 scopus 로고    scopus 로고
    • EUROCRYPT 2004
    • Preliminary version in: Springer, Heidelberg
    • Preliminary version in: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Cachin, C.1    Camenisch, J.L.2
  • 14
    • 34848837353 scopus 로고    scopus 로고
    • Correcting errors without leaking partial information
    • DOI 10.1145/1060590.1060688, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
    • Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 654-663. ACM (2005) (Pubitemid 43098639)
    • (2005) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 654-663
    • Dodis, Y.1    Smith, A.2
  • 15
    • 34848837353 scopus 로고    scopus 로고
    • Correcting errors without leaking partial information
    • DOI 10.1145/1060590.1060688, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
    • Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 654-663. ACM (2005) (Pubitemid 43098639)
    • (2005) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 654-663
    • Dodis, Y.1    Smith, A.2
  • 16
    • 84879875394 scopus 로고    scopus 로고
    • Candidate multilinear maps from ideal lattices
    • Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7881 , pp. 1-17
    • Garg, S.1    Gentry, C.2    Halevi, S.3
  • 17
    • 33748600953 scopus 로고    scopus 로고
    • On the impossibility of obfuscation with auxiliary input
    • Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553-562 (2005)
    • (2005) FOCS , pp. 553-562
    • Goldwasser, S.1    Kalai, Y.T.2
  • 18
    • 38049015775 scopus 로고    scopus 로고
    • On best-possible obfuscation
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Goldwasser, S., Rothblum, G.N.: On best-possible obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 194-213
    • Goldwasser, S.1    Rothblum, G.N.2
  • 19
    • 74349112587 scopus 로고    scopus 로고
    • Obfuscation for cryptographic purposes
    • Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purposes. J. Cryptology 23(1), 121-168 (2010)
    • (2010) J. Cryptology , vol.23 , Issue.1 , pp. 121-168
    • Hofheinz, D.1    Malone-Lee, J.2    Stam, M.3
  • 22
    • 35048895442 scopus 로고    scopus 로고
    • Positive results and techniques for obfuscation
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 20-39
    • Lynn, B.1    Prabhakaran, M.2    Sahai, A.3
  • 23
    • 33646832943 scopus 로고    scopus 로고
    • Abstract models of computation in cryptography
    • Smart, N.P. (ed.) Cryptography and Coding 2005. Springer, Heidelberg
    • Maurer, U.M.: Abstract models of computation in cryptography. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 1-12. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3796 , pp. 1-12
    • Maurer, U.M.1
  • 25
    • 84873945151 scopus 로고    scopus 로고
    • On the circular security of bit-encryption
    • Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
    • Rothblum, R.D.: On the circular security of bit-encryption. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 579-598. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 579-598
    • Rothblum, R.D.1
  • 26
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 27
    • 33745541383 scopus 로고    scopus 로고
    • On obfuscating point functions
    • Gabow, H.N., Fagin, R. (eds.) ACM
    • Wee, H.: On obfuscating point functions. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 523-532. ACM (2005)
    • (2005) STOC , pp. 523-532
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.