Limits on the Power of Indistinguishability Obfuscation and Functional Encryption (Q3179266): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Practical Security of Inner Product Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Selective to Adaptive Security in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (im)possibility of obfuscating programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle / rank
 
Normal rank
Property / cites work
 
Property / cites work: Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator / rank
 
Normal rank
Property / cites work
 
Property / cites work: ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect Structure on the Edge of Chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation: From Approximate to Exact / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Extractability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Signatures and Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-Private Functional Encryption in the Private-Key Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364570 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364544 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obfuscation of Probabilistic Circuits and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Obfuscation with Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Round Secure MPC from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounds on the Efficiency of Generic Cryptographic Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Security Preserving Reductions – Revised Terminology / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3729902 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-input Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On best-possible obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Randomized Functionalities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Pseudorandom Generator from any One-way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Communication Complexity of Secure Function Evaluation with Long Output / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5750403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Way Functions and (Im)perfect Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4871218 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption: From Private-Key to Public-Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249649 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Punctured Programming Approach to Adaptively Secure Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On obfuscating point functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments / rank
 
Normal rank

Latest revision as of 05:18, 13 July 2024

scientific article
Language Label Description Also known as
English
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
scientific article

    Statements

    Limits on the Power of Indistinguishability Obfuscation and Functional Encryption (English)
    0 references
    0 references
    0 references
    21 December 2016
    0 references
    cryptography
    0 references
    lower bounds
    0 references
    indistinguishability obfuscation
    0 references
    functional encryption
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references