-
1
-
-
84894263255
-
Differing-inputs obfuscation and applications
-
Report 2013/689
-
Ananth, P., Boneh, D., Garg, S., Sahai, A., Zhandry, M.: Differing-inputs obfuscation and applications. Cryptology ePrint Archive, Report 2013/689 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Ananth, P.1
Boneh, D.2
Garg, S.3
Sahai, A.4
Zhandry, M.5
-
2
-
-
84905398719
-
Bootstrapping obfuscators via fast pseudorandom functions
-
Report 2013/699
-
Applebaum, B.: Bootstrapping obfuscators via fast pseudorandom functions. Cryptology ePrint Archive, Report 2013/699 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Applebaum, B.1
-
3
-
-
84958538748
-
On extractability obfuscation
-
Lindell, Y. (ed.) TCC 2014 Springer, Heidelberg
-
Boyle, E., Chung, K.-M., Pass, R.: On extractability obfuscation. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 52-73. Springer, Heidelberg (2014)
-
(2014)
LNCS
, vol.8349
, pp. 52-73
-
-
Boyle, E.1
Chung, K.-M.2
Pass, R.3
-
4
-
-
84899056584
-
Indistinguishability obfuscation vs. auxiliary-input extractable functions: One must fall
-
Report 2013/641
-
Bitansky, N., Canetti, R., Paneth, O., Rosen, A.: Indistinguishability obfuscation vs. auxiliary-input extractable functions: One must fall. Cryptology ePrint Archive, Report 2013/641 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Bitansky, N.1
Canetti, R.2
Paneth, O.3
Rosen, A.4
-
5
-
-
84905376181
-
More on the impossibility of virtual-black-box obfuscation with auxiliary input
-
Report 2013/701
-
Bitansky, N., Canetti, R., Paneth, O., Rosen, A.: More on the impossibility of virtual-black-box obfuscation with auxiliary input. Cryptology ePrint Archive, Report 2013/701 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Bitansky, N.1
Canetti, R.2
Paneth, O.3
Rosen, A.4
-
6
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
7
-
-
84860577964
-
On the (im)possibility of obfuscating programs
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. J. ACM 59(2), 6 (2012)
-
(2012)
J. ACM
, vol.59
, Issue.2
, pp. 6
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
8
-
-
84893283837
-
Protecting obfuscation against algebraic attacks
-
Report 2013/631
-
Barak, B., Garg, S., Kalai, Y.T., Paneth, O., Sahai, A.: Protecting obfuscation against algebraic attacks. Cryptology ePrint Archive, Report 2013/631 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Barak, B.1
Garg, S.2
Kalai, Y.T.3
Paneth, O.4
Sahai, A.5
-
9
-
-
84899124468
-
Limits of extractability assumptions with distributional auxiliary input
-
Report 2013/703
-
Boyle, E., Pass, R.: Limits of extractability assumptions with distributional auxiliary input. Cryptology ePrint Archive, Report 2013/703 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Boyle, E.1
Pass, R.2
-
10
-
-
84893307532
-
Virtual black-box obfuscation for all circuits via generic graded encoding
-
Report 2013/563
-
Brakerski, Z., Rothblum, G.N.: Virtual black-box obfuscation for all circuits via generic graded encoding. Cryptology ePrint Archive, Report 2013/563 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Brakerski, Z.1
Rothblum, G.N.2
-
11
-
-
84905403295
-
Poly-many hardcore bits for any one-way function
-
Report 2013/873
-
Bellare, M., Tessaro, S.: Poly-many hardcore bits for any one-way function. Cryptology ePrint Archive, Report 2013/873 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Bellare, M.1
Tessaro, S.2
-
12
-
-
84904150739
-
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
-
Report 2013/642
-
Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Cryptology ePrint Archive, Report 2013/642 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Boneh, D.1
Zhandry, M.2
-
13
-
-
84893494300
-
Candidate indistinguishability obfuscation and functional encryption for all circuits
-
To appear in
-
Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. To appear in FOCS 2013, vol. 2013, p. 451 (2013)
-
(2013)
FOCS 2013
, vol.2013
, pp. 451
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Raykova, M.4
Sahai, A.5
Waters, B.6
-
14
-
-
84894228823
-
Two-round secure mpc from indistinguishability obfuscation
-
Report 2013/601
-
Garg, S., Gentry, C., Halevi, S., Raykova, M.: Two-round secure mpc from indistinguishability obfuscation. Cryptology ePrint Archive, Report 2013/601 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Raykova, M.4
-
15
-
-
84916216325
-
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
-
Report 2013/860
-
Garg, S., Gentry, C., Halevi, S., Wichs, D.: On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Cryptology ePrint Archive, Report 2013/860 (2013), http://eprint.iacr. org/
-
(2013)
Cryptology ePrint Archive
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Wichs, D.4
-
16
-
-
84901681842
-
Multi-input functional encryption
-
Report 2013/727
-
Goldwasser, S., Goyal, V., Jain, A., Sahai, A.: Multi-input functional encryption. Cryptology ePrint Archive, Report 2013/727 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Goldwasser, S.1
Goyal, V.2
Jain, A.3
Sahai, A.4
-
17
-
-
84879800977
-
Witness encryption and its applications
-
Garg, S., Gentry, C., Sahai, A., Waters, B.: Witness encryption and its applications. In: STOC (2013)
-
(2013)
STOC
-
-
Garg, S.1
Gentry, C.2
Sahai, A.3
Waters, B.4
-
18
-
-
84905393601
-
Functional encryption for randomized functionalities
-
Report 2013/729
-
Goyal, V., Jain, A., Koppula, V., Sahai, A.: Functional encryption for randomized functionalities. Cryptology ePrint Archive, Report 2013/729 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Goyal, V.1
Jain, A.2
Koppula, V.3
Sahai, A.4
-
19
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553-562 (2005)
-
(2005)
FOCS
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
20
-
-
84905368385
-
A note on the impossibility of obfuscation with auxiliary input
-
Report 2013/665
-
Goldwasser, S., Kalai, Y.T.: A note on the impossibility of obfuscation with auxiliary input. Cryptology ePrint Archive, Report 2013/665 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
21
-
-
84884477333
-
How to run turing machines on encrypted data
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II Springer, Heidelberg
-
Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: How to run turing machines on encrypted data. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 536-553. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 536-553
-
-
Goldwasser, S.1
Kalai, Y.T.2
Popa, R.A.3
Vaikuntanathan, V.4
Zeldovich, N.5
-
22
-
-
84937414062
-
Zero-knowledge and code obfuscation
-
Okamoto, T. (ed.) ASIACRYPT 2000 Springer, Heidelberg
-
Hada, S.: Zero-knowledge and code obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 443-457
-
-
Hada, S.1
-
23
-
-
84894289440
-
Replacing a random oracle: Full domain hash from indistinguishability obfuscation
-
Report 2013/509
-
Hohenberger, S., Sahai, A., Waters, B.: Replacing a random oracle: Full domain hash from indistinguishability obfuscation. Cryptology ePrint Archive, Report 2013/509 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Hohenberger, S.1
Sahai, A.2
Waters, B.3
-
24
-
-
84905399932
-
Obfuscation [implies] (ind-cpa security [does not imply] circular security)
-
Report 2013/690
-
Marcedone, A., Orlandi, C.: Obfuscation [implies] (ind-cpa security [does not imply] circular security). Cryptology ePrint Archive, Report 2013/690 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Marcedone, A.1
Orlandi, C.2
-
25
-
-
35248818856
-
On cryptographic assumptions and challenges
-
Boneh, D. (ed.) CRYPTO 2003 Springer, Heidelberg
-
Naor, M.: On cryptographic assumptions and challenges. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96-109. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 96-109
-
-
Naor, M.1
-
26
-
-
84905397170
-
Obfuscation-based non-blackbox simulation and four message concurrent zero knowledge for np
-
Report 2013/754
-
Pandey, O., Prabhakaran, M., Sahai, A.: Obfuscation-based non-blackbox simulation and four message concurrent zero knowledge for np. Cryptology ePrint Archive, Report 2013/754 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Pandey, O.1
Prabhakaran, M.2
Sahai, A.3
-
27
-
-
84894240173
-
How to use indistinguishability obfuscation: Deniable encryption, and more
-
Report 2013/454
-
Sahai, A., Waters, B.: How to use indistinguishability obfuscation: Deniable encryption, and more. Cryptology ePrint Archive, Report 2013/454 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Sahai, A.1
Waters, B.2
|