Obfuscation for cryptographic purposes
From MaRDI portal
Publication:2267356
DOI10.1007/s00145-009-9046-1zbMath1181.94096OpenAlexW2049843043MaRDI QIDQ2267356
Martijn Stam, John Malone-Lee, Dennis Hofheinz
Publication date: 1 March 2010
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://infoscience.epfl.ch/record/172912/files/paper.pdf
Related Items
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption, Obfuscating conjunctions, A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- The asymptotic distribution of the supremum of the standardized empirical distribution function on subintervals
- Complete characterization of security notions for probabilistic private-key encryption
- On obfuscating point functions
- Correcting errors without leaking partial information
- Obfuscation for Cryptographic Purposes
- On Best-Possible Obfuscation
- Securely Obfuscating Re-encryption
- How to Shuffle in Public
- Deterministic and Efficiently Searchable Encryption
- New directions in cryptography
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Software protection and simulation on oblivious RAMs
- Advances in Cryptology - EUROCRYPT 2004
- Private Searching on Streaming Data
- Theory of Cryptography