Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits

From MaRDI portal
Revision as of 17:59, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2816296

DOI10.1137/14095772XzbMath1348.94048OpenAlexW2474861573WikidataQ57568016 ScholiaQ57568016MaRDI QIDQ2816296

Mariana Raykova, Sanjam Garg, Shai Halevi, Brent Waters, Amit Sahai, Craig Gentry

Publication date: 4 July 2016

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/14095772x




Related Items (only showing first 100 items - show all)

One-Way Functions and (Im)perfect ObfuscationReusable Two-Round MPC from LPNQuantum attribute-based encryption: a comprehensive studyMulti-input non-interactive functional encryption: constructions and applicationsOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionRegistered attribute-based encryptionUnbounded quadratic functional encryption and more from pairingsStructure-preserving compilers from new notions of obfuscationsEfficient and universally composable single secret leader election from pairingsTransparent batchable time-lock puzzles and applications to Byzantine consensusFunctional encryption against probabilistic queries: definition, construction and applications(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linOn the security of functional encryption in the generic group modelWitness encryption from smooth projective hashing systemCollusion resistant copy-protection for watermarkable functionalitiesABE for circuits with constant-size secret keys and adaptive securityMulti-input quadratic functional encryption: stronger security, broader functionalityRate-1 incompressible encryption from standard assumptionsStatistical security in two-party computation revisitedFully-secure MPC with minimal trustHomomorphic encryption: a mathematical surveymrNISC from LWE with polynomial modulusMemory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesCumulatively all-lossy-but-one trapdoor functions from standard assumptionsCollusion-resistant functional encryption for RAMsWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)(Inner-product) functional encryption with updatable ciphertextsSNARGs for monotone policy batch NPGeneric constructions of master-key KDM secure attribute-based encryptionThe pseudorandom oracle model and ideal obfuscationComputational wiretap coding from indistinguishability obfuscationMaliciously secure massively parallel computation for all-but-one corruptionsQuantum encryption with certified deletion, revisited: public key, attribute-based, and classical communicationTime-release cryptography from minimal circuit assumptionsConstrained (Verifiable) Pseudorandom Function from Functional EncryptionA survey on functional encryptionEfficient lattice-based inner-product functional encryptionLower bounds for the number of decryption updates in registration-based encryptionPPAD is as hard as LWE and iterated squaringGeneric construction of trace-and-revoke inner product functional encryptionPractical multi-party quantum homomorphic encryptionUniversal ring signatures in the standard modelInstantiability of classical random-oracle-model encryption transformsNonmalleable digital lockers and robust fuzzy extractors in the plain modelLattice-based cryptography: a surveyRound-optimal black-box MPC in the plain modelSecurity-preserving distributed samplers: how to generate any CRS in one round without random oraclesA framework for statistically sender private OT with optimal rateStreaming functional encryptionHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreConstant input attribute based (and predicate) encryption from evasive and tensor LWETracing quantum state distinguishers via backtrackingReductions from module lattices to free module lattices, and application to dequantizing module-LLLHardness of Continuous Local Search: Query Complexity and Cryptographic Lower BoundsCollusion Resistant Traitor Tracing from Learning with ErrorsStructure Versus Hardness Through the Obfuscation LensOn the complexity of compressing obfuscationDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsAccess Control Encryption for Equality, Comparison, and MoreConstrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key DelegationConstraining Pseudorandom Functions PrivatelyUniversal Samplers with Fast VerificationZeroizing Attacks on Indistinguishability Obfuscation over CLT13Separating IND-CPA and Circular Security for Unbounded Length Key CyclesRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsMulti-input Inner-Product Functional Encryption from PairingsSimplifying Design and Analysis of Complex Predicate Encryption SchemesOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsCryptography with UpdatesCandidate iO from homomorphic encryption schemesEfficiently Obfuscating Re-Encryption Program Under DDH AssumptionInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRFCCA Secure Attribute-Hiding Inner Product Encryption from Minimal AssumptionUnnamed ItemNP-hardness of approximating meta-complexity: a cryptographic approachIndistinguishability obfuscation, range avoidance, and bounded arithmeticObfuscation of pseudo-deterministic quantum circuitsUnbounded inner product functional encryption from bilinear mapsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Watermarking cryptographic functionalities from standard lattice assumptionsDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessSimple and generic constructions of succinct functional encryptionObfustopia built on secret-key functional encryptionCan PPAD hardness be based on standard cryptographic assumptions?Functional Encryption for Cascade Automata (Extended Abstract)Minicrypt primitives with algebraic structure and applicationsPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareBreaking the Sub-Exponential Barrier in ObfustopiaLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program ObfuscatorsIdentity-based re-encryption scheme with lightweight re-encryption key generationAdaptive Simulation Security for Inner Product Functional EncryptionThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOHow to Compute in the Presence of Leakage


Uses Software



Cites Work




This page was built for publication: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits