Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-77883-5_4 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3037475319 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple Functional Encryption Schemes for Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption for Inner Products, from Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional encryption for bounded collusions, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Selective to Adaptive Security in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom generators with long stretch and low locality from random local one-way functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Dichotomy for Local Small-Bias Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic attacks against random local functions and their countermeasures / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Algorithms for Learning in Presence of Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical functional encryption for quadratic functions with applications to predicate encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Obfuscation against Algebraic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5875789 / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Cryptomania to Obfustopia Through Secret-Key Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of Goldreich's one-way function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate iO from homomorphic encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting the hardness of binary error LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: GGH15 beyond permutation branching programs: proofs, attacks, and candidates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Watermarking cryptographic capabilities / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the concrete security of Goldreich's pseudorandom generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Obfuscation in a Weak Multilinear Map Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate One-Way Functions Based on Expander Graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-input Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable garbled circuits and succinct functional encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Time Programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption for Circuits from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generate and Use Universal Samplers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2739458 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation for Turing Machines with Unbounded Memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sum of squares lower bounds for refuting any CSP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness of SIS and LWE with Small Parameters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank

Latest revision as of 11:21, 27 July 2024

scientific article
Language Label Description Also known as
English
Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
scientific article

    Statements

    Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    8 December 2021
    0 references
    functional encryption
    0 references
    indistinguishability obfuscation
    0 references
    Boolean pseudorandom generators
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers