Indistinguishability obfuscation from well-founded assumptions

From MaRDI portal
Revision as of 05:52, 10 July 2024 by Import240710060729 (talk | contribs) (Created automatically from import240710060729)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:6065171

DOI10.1145/3406325.3451093arXiv2008.09317OpenAlexW3082860856WikidataQ130961341 ScholiaQ130961341MaRDI QIDQ6065171

Huijia Lin, Amit Sahai, Aayush Jain

Publication date: 14 November 2023

Published in: Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/2008.09317




Related Items (59)

Secure computation from one-way noisy communication, or: anti-correlation via anti-concentrationDeniable fully homomorphic encryption from learning with errorsCounterexamples to new circular security assumptions underlying iOCryptanalysis of candidate obfuscators for affine determinant programsIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Incompressible cryptographyUnclonable polymers and their cryptographic applicationsDistributed (correlation) samplers: how to remove a trusted dealer in one roundDynamic collusion bounded functional encryption from identity-based encryptionBounded Collusion ABE for TMs from IBEMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsSNARGs and PPAD hardness from the decisional Diffie-Hellman assumptionOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionRegistered attribute-based encryptionMulti-key and multi-input predicate encryption from learning with errorsBroadcast, trace and revoke with optimal parameters from polynomial hardnessStructure-preserving compilers from new notions of obfuscationsBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationTransparent batchable time-lock puzzles and applications to Byzantine consensusPattern matching in encrypted stream from inner product encryptionFunctional encryption against probabilistic queries: definition, construction and applicationsDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedTIDE: a novel approach to constructing timed-release encryptionUnbounded predicate inner product functional encryption from pairingsMulti-input quadratic functional encryption: stronger security, broader functionalityRate-1 incompressible encryption from standard assumptionsFully-secure MPC with minimal trustThe power of natural properties as oraclesHomomorphic encryption: a mathematical surveyTrustworthy sealed-bid auction with low communication cost atop blockchainMemory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesWitness encryption and null-iO from evasive LWEWorst-case subexponential attacks on PRGs of constant degree or constant localityPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Generic constructions of master-key KDM secure attribute-based encryptionThe pseudorandom oracle model and ideal obfuscationComputational wiretap coding from indistinguishability obfuscationCandidate witness encryption from lattice techniquesMulti-input attribute based encryption and predicate encryptionBeyond software watermarking: traitor-tracing for pseudorandom functionsForward-secure public key encryption without key update from proof-of-stake blockchainBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationPublic-key watermarking schemes for pseudorandom functionsThe direction of updatable encryption does matterFully succinct batch arguments for \textsf{NP} from indistinguishability obfuscationLower bounds for the number of decryption updates in registration-based encryptionPPAD is as hard as LWE and iterated squaringInstantiability of classical random-oracle-model encryption transformsImpossibilities in succinct arguments: black-box extraction and moreNon-interactive zero-knowledge from non-interactive batch argumentsMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNStreaming functional encryptionHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreIndistinguishability obfuscationComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Succinct LWE sampling, random polynomials, and obfuscationShort attribute-based signatures for arbitrary Turing machines from standard assumptionsCandidate iO from homomorphic encryption schemesObfustopia built on secret-key functional encryption







This page was built for publication: Indistinguishability obfuscation from well-founded assumptions