메뉴 건너뛰기




Volumn 9015, Issue , 2015, Pages 468-497

Obfuscation of probabilistic circuits and applications

Author keywords

[No Author keywords available]

Indexed keywords

PROBABILITY DISTRIBUTIONS; TIMING CIRCUITS; RECONFIGURABLE HARDWARE;

EID: 84924401939     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-46497-7_19     Document Type: Conference Paper
Times cited : (81)

References (37)
  • 1
    • 84893417211 scopus 로고    scopus 로고
    • On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
    • In: Stam, M. (ed.), Springer, Heidelberg
    • Alwen, J., Barbosa, M., Farshim, P., Gennaro, R., Dov Gordon, S., Tessaro, S., Wilson, D.A.: On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 65–84. Springer, Heidelberg (2013)
    • (2013) IMACC 2013. LNCS , vol.8308 , pp. 65-84
    • Alwen, J.1    Barbosa, M.2    Farshim, P.3    Gennaro, R.4    Dov Gordon, S.5    Tessaro, S.6    Wilson, D.A.7
  • 3
    • 84905398719 scopus 로고    scopus 로고
    • Bootstrapping obfuscators via fast pseudorandom functions
    • Applebaum, B.: Bootstrapping obfuscators via fast pseudorandom functions. IACR Cryptology ePrint Archive, 2013:699 (2013)
    • (2013) IACR Cryptology Eprint Archive , vol.2013 , pp. 699
    • Applebaum, B.1
  • 4
    • 17744366431 scopus 로고    scopus 로고
    • Cryptography in NC0
    • IEEE Computer Society
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC0. In: FOCS, pp. 166–175. IEEE Computer Society (2004)
    • (2004) FOCS , pp. 166-175
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 5
    • 33745306666 scopus 로고    scopus 로고
    • Computationally private randomizing polynomials and their applications
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Computational Complexity 15(2), 115–162 (2006)
    • (2006) Computational Complexity , vol.15 , Issue.2 , pp. 115-162
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 6
    • 84901664388 scopus 로고    scopus 로고
    • Protecting obfuscation against algebraic attacks
    • In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
    • Barak, B., Garg, S., Kalai, Y.T., Paneth, O., Sahai, A.: Protecting obfuscation against algebraic attacks. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 221–238. Springer, Heidelberg (2014)
    • (2014) EUROCRYPT 2014. LNCS , vol.8441 , pp. 221-238
    • Barak, B.1    Garg, S.2    Kalai, Y.T.3    Paneth, O.4    Sahai, A.5
  • 8
    • 67650685947 scopus 로고    scopus 로고
    • Possibility and impossibility results for encryption and commitment secure under selective opening
    • In: Joux, A. (ed.), Springer, Heidelberg
    • Bellare, M., Hofheinz, D., Yilek, S.: Possibility and impossibility results for encryption and commitment secure under selective opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1–35. Springer, Heidelberg (2009)
    • (2009) EUROCRYPT 2009. LNCS , vol.5479 , pp. 1-35
    • Bellare, M.1    Hofheinz, D.2    Yilek, S.3
  • 9
    • 84916235975 scopus 로고    scopus 로고
    • Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation
    • In: Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
    • Bellare, M., Stepanovs, I., Tessaro, S.: Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 102–121. Springer, Heidelberg (2014)
    • (2014) ASIACRYPT 2014, Part II. LNCS , vol.8874 , pp. 102-121
    • Bellare, M.1    Stepanovs, I.2    Tessaro, S.3
  • 10
    • 84905402107 scopus 로고    scopus 로고
    • The impossibility of obfuscation with auxiliary input or a universal simulator
    • In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
    • Bitansky, N., Canetti, R., Cohn, H., Goldwasser, S., Kalai, Y.T., Paneth, O., Rosen, A.: The impossibility of obfuscation with auxiliary input or a universal simulator. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol. 8617, pp. 71–89. Springer, Heidelberg (2014)
    • (2014) CRYPTO 2014, Part II. LNCS , vol.8617 , pp. 71-89
    • Bitansky, N.1    Canetti, R.2    Cohn, H.3    Goldwasser, S.4    Kalai, Y.T.5    Paneth, O.6    Rosen, A.7
  • 12
    • 84892392741 scopus 로고    scopus 로고
    • Constrained pseudorandom functions and their applications
    • Boneh, D.,Waters, B., In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
    • Boneh, D.,Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 280–300. Springer, Heidelberg (2013)
    • (2013) ASIACRYPT 2013, Part II. LNCS , vol.8270 , pp. 280-300
  • 13
    • 84958538748 scopus 로고    scopus 로고
    • On extractability obfuscation
    • In: Lindell, Y. (ed.), Springer, Heidelberg
    • Boyle, E., Chung, K.-M., Pass, R.: On extractability obfuscation. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 52–73. Springer, Heidelberg (2014)
    • (2014) TCC 2014. LNCS , vol.8349 , pp. 52-73
    • Boyle, E.1    Chung, K.-M.2    Pass, R.3
  • 14
    • 84958528095 scopus 로고    scopus 로고
    • Functional signatures and pseudorandom functions
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 501–519. Springer, Heidelberg (2014)
    • (2014) PKC 2014. LNCS8383 , pp. 501-519
    • Boyle, E.1    Goldwasser, S.2    Ivan, I.3
  • 15
    • 84865507640 scopus 로고    scopus 로고
    • Fully homomorphic encryption without modulus switching from classical gapSVP
    • In: Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg
    • Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical gapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868–886. Springer, Heidelberg (2012)
    • (2012) CRYPTO 2012. LNCS , vol.7417 , pp. 868-886
    • Brakerski, Z.1
  • 16
    • 84856466374 scopus 로고    scopus 로고
    • Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping
    • Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: ITCS, pp. 309–325 (2012)
    • (2012) ITCS , pp. 309-325
    • Brakerski, Z.1    Gentry, C.2
  • 17
    • 84884472198 scopus 로고    scopus 로고
    • Obfuscating conjunctions
    • In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
    • Brakerski, Z., Rothblum, G.N.: Obfuscating conjunctions. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 416–434. Springer, Heidelberg (2013)
    • (2013) CRYPTO 2013, Part II. LNCS , vol.8043 , pp. 416-434
    • Brakerski, Z.1    Rothblum, G.N.2
  • 18
    • 80955132201 scopus 로고    scopus 로고
    • Efficient fully homomorphic encryption from (Standard) LWE
    • References are to full version
    • Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS, pp. 97–106 (2011), References are to full version: http://eprint.iacr.org/2011/344
    • (2011) FOCS , pp. 97-106
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 20
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier’s probabilistic public-key system
    • In: Kim, K.-C. (ed.), Springer, Heidelberg
    • Damgard, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)
    • (2001) PKC 2001. LNCS , vol.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 21
    • 84893494300 scopus 로고    scopus 로고
    • Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
    • Garg, S., Gentry, C., Halevi, S., Sahai, A., Raikova, M., Waters, B.: Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. In: FOCS (2013)
    • (2013) FOCS
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Sahai, A.4    Raikova, M.5    Waters, B.6
  • 22
    • 84905378383 scopus 로고    scopus 로고
    • On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
    • In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S., Wichs, D.: On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 518–535. Springer, Heidelberg (2014)
    • (2014) CRYPTO 2014, Part I. LNCS , vol.8616 , pp. 518-535
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Wichs, D.4
  • 23
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169–178 (2009)
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 24
    • 84884485247 scopus 로고    scopus 로고
    • Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
    • In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
    • Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013)
    • (2013) CRYPTO 2013, Part I. LNCS , vol.8042 , pp. 75-92
    • Gentry, C.1    Sahai, A.2    Waters, B.3
  • 25
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 26
    • 33748600953 scopus 로고    scopus 로고
    • On the impossibility of obfuscation with auxiliary input
    • IEEE Computer Society
    • Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553–562. IEEE Computer Society (2005)
    • (2005) FOCS , pp. 553-562
    • Goldwasser, S.1    Kalai, Y.T.2
  • 28
    • 82955177043 scopus 로고    scopus 로고
    • Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
    • In: Lee, D.H., Wang, X. (eds.), Springer, Heidelberg
    • Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 70–88. Springer, Heidelberg (2011)
    • (2011) ASIACRYPT 2011. LNCS , vol.7073 , pp. 70-88
    • Hemenway, B.1    Libert, B.2    Ostrovsky, R.3    Vergnaud, D.4
  • 29
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • IEEE Computer Society
    • Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: FOCS, pp. 294–304. IEEE Computer Society (2000)
    • (2000) FOCS , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 30
    • 84889072826 scopus 로고    scopus 로고
    • Delegatable pseudorandom functions and applications
    • Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.), ACM
    • Kiayias, A., Papadopoulos, S., Triandopoulos, N., Zacharias, T.: Delegatable pseudorandom functions and applications. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) CCS, pp. 669–684. ACM (2013)
    • (2013) CCS , pp. 669-684
    • Kiayias, A.1    Papadopoulos, S.2    Triandopoulos, N.3    Zacharias, T.4
  • 31
    • 57049100461 scopus 로고    scopus 로고
    • Games for exchanging information
    • Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423–432 (2008)
    • (2008) STOC , pp. 423-432
    • Kol, G.1    Naor, M.2
  • 33
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • In: Stern, J. (ed.), Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 34
    • 51849126892 scopus 로고    scopus 로고
    • A framework for efficient and composable oblivious transfer
    • In: Wagner, D. (ed.), Springer, Heidelberg
    • Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554–571. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 35
    • 84855570859 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications. SIAM
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. SIAM J. Comput. 40(6), 1803–1844 (2011)
    • (2011) J. Comput , vol.40 , Issue.6 , pp. 1803-1844
    • Peikert, C.1    Waters, B.2
  • 36
    • 38049182742 scopus 로고    scopus 로고
    • Rerandomizable RCCA encryption
    • In: Menezes, A. (ed.), Springer, Heidelberg
    • Prabhakaran, M., Rosulek, M.: Rerandomizable RCCA encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 517–534. Springer, Heidelberg (2007)
    • (2007) CRYPTO 2007. LNCS , vol.4622 , pp. 517-534
    • Prabhakaran, M.1    Rosulek, M.2
  • 37
    • 84904361647 scopus 로고    scopus 로고
    • How to use indistinguishability obfuscation: Deniable encryption, and more
    • Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: STOC, pp. 475–484 (2014)
    • (2014) STOC , pp. 475-484
    • Sahai, A.1    Waters, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.