메뉴 건너뛰기




Volumn 8616 LNCS, Issue PART 1, 2014, Pages 518-535

On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84905378383     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44371-2_29     Document Type: Conference Paper
Times cited : (62)

References (27)
  • 2
    • 84905398719 scopus 로고    scopus 로고
    • Bootstrapping obfuscators via fast pseudorandom functions
    • Report 2013/699
    • Applebaum, B.: Bootstrapping obfuscators via fast pseudorandom functions. Cryptology ePrint Archive, Report 2013/699 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Applebaum, B.1
  • 3
    • 84958538748 scopus 로고    scopus 로고
    • On extractability obfuscation
    • Lindell, Y. (ed.) TCC 2014 Springer, Heidelberg
    • Boyle, E., Chung, K.-M., Pass, R.: On extractability obfuscation. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 52-73. Springer, Heidelberg (2014)
    • (2014) LNCS , vol.8349 , pp. 52-73
    • Boyle, E.1    Chung, K.-M.2    Pass, R.3
  • 4
    • 84899056584 scopus 로고    scopus 로고
    • Indistinguishability obfuscation vs. auxiliary-input extractable functions: One must fall
    • Report 2013/641
    • Bitansky, N., Canetti, R., Paneth, O., Rosen, A.: Indistinguishability obfuscation vs. auxiliary-input extractable functions: One must fall. Cryptology ePrint Archive, Report 2013/641 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Bitansky, N.1    Canetti, R.2    Paneth, O.3    Rosen, A.4
  • 5
    • 84905376181 scopus 로고    scopus 로고
    • More on the impossibility of virtual-black-box obfuscation with auxiliary input
    • Report 2013/701
    • Bitansky, N., Canetti, R., Paneth, O., Rosen, A.: More on the impossibility of virtual-black-box obfuscation with auxiliary input. Cryptology ePrint Archive, Report 2013/701 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Bitansky, N.1    Canetti, R.2    Paneth, O.3    Rosen, A.4
  • 6
    • 79251578513 scopus 로고    scopus 로고
    • On the (Im)possibility of Obfuscating Programs
    • Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.P.6    Yang, K.7
  • 9
    • 84899124468 scopus 로고    scopus 로고
    • Limits of extractability assumptions with distributional auxiliary input
    • Report 2013/703
    • Boyle, E., Pass, R.: Limits of extractability assumptions with distributional auxiliary input. Cryptology ePrint Archive, Report 2013/703 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Boyle, E.1    Pass, R.2
  • 10
    • 84893307532 scopus 로고    scopus 로고
    • Virtual black-box obfuscation for all circuits via generic graded encoding
    • Report 2013/563
    • Brakerski, Z., Rothblum, G.N.: Virtual black-box obfuscation for all circuits via generic graded encoding. Cryptology ePrint Archive, Report 2013/563 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Brakerski, Z.1    Rothblum, G.N.2
  • 11
    • 84905403295 scopus 로고    scopus 로고
    • Poly-many hardcore bits for any one-way function
    • Report 2013/873
    • Bellare, M., Tessaro, S.: Poly-many hardcore bits for any one-way function. Cryptology ePrint Archive, Report 2013/873 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Bellare, M.1    Tessaro, S.2
  • 12
    • 84904150739 scopus 로고    scopus 로고
    • Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
    • Report 2013/642
    • Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Cryptology ePrint Archive, Report 2013/642 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Boneh, D.1    Zhandry, M.2
  • 13
    • 84893494300 scopus 로고    scopus 로고
    • Candidate indistinguishability obfuscation and functional encryption for all circuits
    • To appear in
    • Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. To appear in FOCS 2013, vol. 2013, p. 451 (2013)
    • (2013) FOCS 2013 , vol.2013 , pp. 451
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Raykova, M.4    Sahai, A.5    Waters, B.6
  • 14
    • 84894228823 scopus 로고    scopus 로고
    • Two-round secure mpc from indistinguishability obfuscation
    • Report 2013/601
    • Garg, S., Gentry, C., Halevi, S., Raykova, M.: Two-round secure mpc from indistinguishability obfuscation. Cryptology ePrint Archive, Report 2013/601 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Raykova, M.4
  • 15
    • 84916216325 scopus 로고    scopus 로고
    • On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
    • Report 2013/860
    • Garg, S., Gentry, C., Halevi, S., Wichs, D.: On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Cryptology ePrint Archive, Report 2013/860 (2013), http://eprint.iacr. org/
    • (2013) Cryptology ePrint Archive
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Wichs, D.4
  • 17
  • 18
    • 84905393601 scopus 로고    scopus 로고
    • Functional encryption for randomized functionalities
    • Report 2013/729
    • Goyal, V., Jain, A., Koppula, V., Sahai, A.: Functional encryption for randomized functionalities. Cryptology ePrint Archive, Report 2013/729 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Goyal, V.1    Jain, A.2    Koppula, V.3    Sahai, A.4
  • 19
    • 33748600953 scopus 로고    scopus 로고
    • On the impossibility of obfuscation with auxiliary input
    • Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553-562 (2005)
    • (2005) FOCS , pp. 553-562
    • Goldwasser, S.1    Kalai, Y.T.2
  • 20
    • 84905368385 scopus 로고    scopus 로고
    • A note on the impossibility of obfuscation with auxiliary input
    • Report 2013/665
    • Goldwasser, S., Kalai, Y.T.: A note on the impossibility of obfuscation with auxiliary input. Cryptology ePrint Archive, Report 2013/665 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Goldwasser, S.1    Kalai, Y.T.2
  • 21
    • 84884477333 scopus 로고    scopus 로고
    • How to run turing machines on encrypted data
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II Springer, Heidelberg
    • Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: How to run turing machines on encrypted data. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 536-553. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 536-553
    • Goldwasser, S.1    Kalai, Y.T.2    Popa, R.A.3    Vaikuntanathan, V.4    Zeldovich, N.5
  • 22
    • 84937414062 scopus 로고    scopus 로고
    • Zero-knowledge and code obfuscation
    • Okamoto, T. (ed.) ASIACRYPT 2000 Springer, Heidelberg
    • Hada, S.: Zero-knowledge and code obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 443-457
    • Hada, S.1
  • 23
    • 84894289440 scopus 로고    scopus 로고
    • Replacing a random oracle: Full domain hash from indistinguishability obfuscation
    • Report 2013/509
    • Hohenberger, S., Sahai, A., Waters, B.: Replacing a random oracle: Full domain hash from indistinguishability obfuscation. Cryptology ePrint Archive, Report 2013/509 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Hohenberger, S.1    Sahai, A.2    Waters, B.3
  • 24
    • 84905399932 scopus 로고    scopus 로고
    • Obfuscation [implies] (ind-cpa security [does not imply] circular security)
    • Report 2013/690
    • Marcedone, A., Orlandi, C.: Obfuscation [implies] (ind-cpa security [does not imply] circular security). Cryptology ePrint Archive, Report 2013/690 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Marcedone, A.1    Orlandi, C.2
  • 25
    • 35248818856 scopus 로고    scopus 로고
    • On cryptographic assumptions and challenges
    • Boneh, D. (ed.) CRYPTO 2003 Springer, Heidelberg
    • Naor, M.: On cryptographic assumptions and challenges. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96-109. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 96-109
    • Naor, M.1
  • 26
    • 84905397170 scopus 로고    scopus 로고
    • Obfuscation-based non-blackbox simulation and four message concurrent zero knowledge for np
    • Report 2013/754
    • Pandey, O., Prabhakaran, M., Sahai, A.: Obfuscation-based non-blackbox simulation and four message concurrent zero knowledge for np. Cryptology ePrint Archive, Report 2013/754 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Pandey, O.1    Prabhakaran, M.2    Sahai, A.3
  • 27
    • 84894240173 scopus 로고    scopus 로고
    • How to use indistinguishability obfuscation: Deniable encryption, and more
    • Report 2013/454
    • Sahai, A., Waters, B.: How to use indistinguishability obfuscation: Deniable encryption, and more. Cryptology ePrint Archive, Report 2013/454 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Sahai, A.1    Waters, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.