-
1
-
-
84893417211
-
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
-
In: Stam, M. (ed.), Springer, Heidelberg
-
Alwen, J., Barbosa, M., Farshim, P., Gennaro, R., Dov Gordon, S., Tessaro, S., Wilson, D.A.: On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 65–84. Springer, Heidelberg (2013)
-
(2013)
IMACC 2013. LNCS
, vol.8308
, pp. 65-84
-
-
Alwen, J.1
Barbosa, M.2
Farshim, P.3
Gennaro, R.4
Dov Gordon, S.5
Tessaro, S.6
Wilson, D.A.7
-
2
-
-
84894263255
-
-
Cryptology ePrint Archive, Report 2013/689
-
Ananth, P., Boneh, D., Garg, S., Sahai, A., Zhandry, M.: Differing-inputs obfuscation and applications. Cryptology ePrint Archive, Report 2013/689 (2013), http://eprint.iacr.org/
-
(2013)
Differing-Inputs Obfuscation and Applications
-
-
Ananth, P.1
Boneh, D.2
Garg, S.3
Sahai, A.4
Zhandry, M.5
-
3
-
-
84905398719
-
Bootstrapping obfuscators via fast pseudorandom functions
-
Applebaum, B.: Bootstrapping obfuscators via fast pseudorandom functions. IACR Cryptology ePrint Archive, 2013:699 (2013)
-
(2013)
IACR Cryptology Eprint Archive
, vol.2013
, pp. 699
-
-
Applebaum, B.1
-
4
-
-
17744366431
-
Cryptography in NC0
-
IEEE Computer Society
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC0. In: FOCS, pp. 166–175. IEEE Computer Society (2004)
-
(2004)
FOCS
, pp. 166-175
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
5
-
-
33745306666
-
Computationally private randomizing polynomials and their applications
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Computational Complexity 15(2), 115–162 (2006)
-
(2006)
Computational Complexity
, vol.15
, Issue.2
, pp. 115-162
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
6
-
-
84901664388
-
Protecting obfuscation against algebraic attacks
-
In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
-
Barak, B., Garg, S., Kalai, Y.T., Paneth, O., Sahai, A.: Protecting obfuscation against algebraic attacks. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 221–238. Springer, Heidelberg (2014)
-
(2014)
EUROCRYPT 2014. LNCS
, vol.8441
, pp. 221-238
-
-
Barak, B.1
Garg, S.2
Kalai, Y.T.3
Paneth, O.4
Sahai, A.5
-
7
-
-
84860577964
-
On the (Im)possibility of obfuscating programs
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. J. ACM 59(2), 6 (2012)
-
(2012)
J. ACM
, vol.59
, Issue.2
, pp. 6
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
8
-
-
67650685947
-
Possibility and impossibility results for encryption and commitment secure under selective opening
-
In: Joux, A. (ed.), Springer, Heidelberg
-
Bellare, M., Hofheinz, D., Yilek, S.: Possibility and impossibility results for encryption and commitment secure under selective opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1–35. Springer, Heidelberg (2009)
-
(2009)
EUROCRYPT 2009. LNCS
, vol.5479
, pp. 1-35
-
-
Bellare, M.1
Hofheinz, D.2
Yilek, S.3
-
9
-
-
84916235975
-
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation
-
In: Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
-
Bellare, M., Stepanovs, I., Tessaro, S.: Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 102–121. Springer, Heidelberg (2014)
-
(2014)
ASIACRYPT 2014, Part II. LNCS
, vol.8874
, pp. 102-121
-
-
Bellare, M.1
Stepanovs, I.2
Tessaro, S.3
-
10
-
-
84905402107
-
The impossibility of obfuscation with auxiliary input or a universal simulator
-
In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
-
Bitansky, N., Canetti, R., Cohn, H., Goldwasser, S., Kalai, Y.T., Paneth, O., Rosen, A.: The impossibility of obfuscation with auxiliary input or a universal simulator. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol. 8617, pp. 71–89. Springer, Heidelberg (2014)
-
(2014)
CRYPTO 2014, Part II. LNCS
, vol.8617
, pp. 71-89
-
-
Bitansky, N.1
Canetti, R.2
Cohn, H.3
Goldwasser, S.4
Kalai, Y.T.5
Paneth, O.6
Rosen, A.7
-
11
-
-
84924361491
-
-
Cryptology ePrint Archive, Report 2014/771
-
Bitansky, N., Garg, S., Telang, S.: Succinct randomized encodings and their applications. Cryptology ePrint Archive, Report 2014/771 (2014), http://eprint.iacr.org/
-
(2014)
Succinct Randomized Encodings and Their Applications
-
-
Bitansky, N.1
Garg, S.2
Telang, S.3
-
12
-
-
84892392741
-
Constrained pseudorandom functions and their applications
-
Boneh, D.,Waters, B., In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
-
Boneh, D.,Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 280–300. Springer, Heidelberg (2013)
-
(2013)
ASIACRYPT 2013, Part II. LNCS
, vol.8270
, pp. 280-300
-
-
-
13
-
-
84958538748
-
On extractability obfuscation
-
In: Lindell, Y. (ed.), Springer, Heidelberg
-
Boyle, E., Chung, K.-M., Pass, R.: On extractability obfuscation. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 52–73. Springer, Heidelberg (2014)
-
(2014)
TCC 2014. LNCS
, vol.8349
, pp. 52-73
-
-
Boyle, E.1
Chung, K.-M.2
Pass, R.3
-
14
-
-
84958528095
-
Functional signatures and pseudorandom functions
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 501–519. Springer, Heidelberg (2014)
-
(2014)
PKC 2014. LNCS8383
, pp. 501-519
-
-
Boyle, E.1
Goldwasser, S.2
Ivan, I.3
-
15
-
-
84865507640
-
Fully homomorphic encryption without modulus switching from classical gapSVP
-
In: Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg
-
Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical gapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868–886. Springer, Heidelberg (2012)
-
(2012)
CRYPTO 2012. LNCS
, vol.7417
, pp. 868-886
-
-
Brakerski, Z.1
-
16
-
-
84856466374
-
Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping
-
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: ITCS, pp. 309–325 (2012)
-
(2012)
ITCS
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
-
17
-
-
84884472198
-
Obfuscating conjunctions
-
In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Brakerski, Z., Rothblum, G.N.: Obfuscating conjunctions. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 416–434. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part II. LNCS
, vol.8043
, pp. 416-434
-
-
Brakerski, Z.1
Rothblum, G.N.2
-
18
-
-
80955132201
-
Efficient fully homomorphic encryption from (Standard) LWE
-
References are to full version
-
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS, pp. 97–106 (2011), References are to full version: http://eprint.iacr.org/2011/344
-
(2011)
FOCS
, pp. 97-106
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
19
-
-
84924410028
-
-
Cryptology ePrint Archive, Report 2014/882
-
Canetti, R., Lin, H., Tessaro, S., Vaikuntanathan, V.: Obfuscation of probabilistic circuits and applications. Cryptology ePrint Archive, Report 2014/882 (2014), http://eprint.iacr.org/
-
(2014)
Obfuscation of Probabilistic Circuits and Applications
-
-
Canetti, R.1
Lin, H.2
Tessaro, S.3
Vaikuntanathan, V.4
-
20
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier’s probabilistic public-key system
-
In: Kim, K.-C. (ed.), Springer, Heidelberg
-
Damgard, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)
-
(2001)
PKC 2001. LNCS
, vol.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
21
-
-
84893494300
-
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
-
Garg, S., Gentry, C., Halevi, S., Sahai, A., Raikova, M., Waters, B.: Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. In: FOCS (2013)
-
(2013)
FOCS
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Sahai, A.4
Raikova, M.5
Waters, B.6
-
22
-
-
84905378383
-
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
-
In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
-
Garg, S., Gentry, C., Halevi, S., Wichs, D.: On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 518–535. Springer, Heidelberg (2014)
-
(2014)
CRYPTO 2014, Part I. LNCS
, vol.8616
, pp. 518-535
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Wichs, D.4
-
23
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169–178 (2009)
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
24
-
-
84884485247
-
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
-
In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part I. LNCS
, vol.8042
, pp. 75-92
-
-
Gentry, C.1
Sahai, A.2
Waters, B.3
-
25
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
26
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input
-
IEEE Computer Society
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553–562. IEEE Computer Society (2005)
-
(2005)
FOCS
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
28
-
-
82955177043
-
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
-
In: Lee, D.H., Wang, X. (eds.), Springer, Heidelberg
-
Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 70–88. Springer, Heidelberg (2011)
-
(2011)
ASIACRYPT 2011. LNCS
, vol.7073
, pp. 70-88
-
-
Hemenway, B.1
Libert, B.2
Ostrovsky, R.3
Vergnaud, D.4
-
29
-
-
0034507841
-
Randomizing polynomials: A new representation with applications to round-efficient secure computation
-
IEEE Computer Society
-
Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: FOCS, pp. 294–304. IEEE Computer Society (2000)
-
(2000)
FOCS
, pp. 294-304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
30
-
-
84889072826
-
Delegatable pseudorandom functions and applications
-
Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.), ACM
-
Kiayias, A., Papadopoulos, S., Triandopoulos, N., Zacharias, T.: Delegatable pseudorandom functions and applications. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) CCS, pp. 669–684. ACM (2013)
-
(2013)
CCS
, pp. 669-684
-
-
Kiayias, A.1
Papadopoulos, S.2
Triandopoulos, N.3
Zacharias, T.4
-
31
-
-
57049100461
-
Games for exchanging information
-
Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423–432 (2008)
-
(2008)
STOC
, pp. 423-432
-
-
Kol, G.1
Naor, M.2
-
33
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
In: Stern, J. (ed.), Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
34
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
In: Wagner, D. (ed.), Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554–571. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
35
-
-
84855570859
-
Lossy trapdoor functions and their applications. SIAM
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. SIAM J. Comput. 40(6), 1803–1844 (2011)
-
(2011)
J. Comput
, vol.40
, Issue.6
, pp. 1803-1844
-
-
Peikert, C.1
Waters, B.2
-
36
-
-
38049182742
-
Rerandomizable RCCA encryption
-
In: Menezes, A. (ed.), Springer, Heidelberg
-
Prabhakaran, M., Rosulek, M.: Rerandomizable RCCA encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 517–534. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007. LNCS
, vol.4622
, pp. 517-534
-
-
Prabhakaran, M.1
Rosulek, M.2
-
37
-
-
84904361647
-
How to use indistinguishability obfuscation: Deniable encryption, and more
-
Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: STOC, pp. 475–484 (2014)
-
(2014)
STOC
, pp. 475-484
-
-
Sahai, A.1
Waters, B.2
|