|
|
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Faster Bootstrapping with Polynomial Error / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Garble Arithmetic Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Protecting Obfuscation against Algebraic Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4783716 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bounded Key-Dependent Message Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Sum-of-squares meets program obfuscation, revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: From Cryptomania to Obfustopia Through Secret-Key Functional Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation from Functional Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice-based FHE as secure as PKE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalyses of Candidate Branching Program Obfuscators / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Multilinear Maps over the Integers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2724587 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Succinct LWE sampling, random polynomials, and obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Sanitization of FHE Ciphertexts / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Two-Round Secure MPC from Indistinguishability Obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Obfuscation in a Weak Multilinear Map Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from circular security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully homomorphic encryption using ideal lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Reusable garbled circuits and succinct functional encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2707439 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Counterexamples to new circular security assumptions underlying iO / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of GGH Map / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Amplifying the security of functional encryption, unconditionally / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation with Non-trivial Efficiency / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Homomorphic time-lock puzzles and applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandomness of ring-LWE for any ring and modulus / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to use indistinguishability obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate obfuscation via oblivious LWE sampling / rank |
| | Normal rank |