Candidate obfuscation via oblivious LWE sampling (Q2056783): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-77883-5_5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3089736144 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate iO from homomorphic encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Return of GGH15: provable security against zeroizing attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5875789 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2019. Proceedings. Part III / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private constrained PRFs (and more) from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalyses of Candidate Branching Program Obfuscators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Matrix PRFs: constructions, attacks, and applications to obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH15 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: GGH15 beyond permutation branching programs: proofs, attacks, and candidates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23--25, 2015. Proceedings, Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preventing CLT attacks on obfuscation with linear overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compressible FHE with applications to PIR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable garbled circuits and succinct functional encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Witness Encryption from Instance Independent Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Best-Possible Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-based encryption for circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leveled Fully Homomorphic Signatures from Standard Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Invertible Sampling and Adaptive Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation with Non-trivial Efficiency / rank
 
Normal rank
Property / cites work
 
Property / cites work: Output-Compressing Randomized Encodings and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two Round Multiparty Computation via Multi-key FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum attacks against indistinguishablility obfuscators proved secure in the weak multilinear map model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noninteractive zero knowledge for NP from (Plain) Learning With Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank

Latest revision as of 10:21, 27 July 2024

scientific article
Language Label Description Also known as
English
Candidate obfuscation via oblivious LWE sampling
scientific article

    Statements

    Candidate obfuscation via oblivious LWE sampling (English)
    0 references
    0 references
    0 references
    8 December 2021
    0 references
    indistinguishability obfuscation
    0 references
    learning-with-errors
    0 references
    0 references
    0 references
    0 references

    Identifiers