Obfuscation for cryptographic purposes
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1583797 (Why is no real title available?)
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 176562 (Why is no real title available?)
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1088253 (Why is no real title available?)
- scientific article; zbMATH DE number 1775397 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Complete characterization of security notions for probabilistic private-key encryption
- Correcting errors without leaking partial information
- Deterministic and Efficiently Searchable Encryption
- How to Shuffle in Public
- New directions in cryptography
- Obfuscation for Cryptographic Purposes
- On Best-Possible Obfuscation
- On obfuscating point functions
- Private Searching on Streaming Data
- Probabilistic encryption
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Securely Obfuscating Re-encryption
- Software protection and simulation on oblivious RAMs
- The asymptotic distribution of the supremum of the standardized empirical distribution function on subintervals
- Theory of Cryptography
Cited in
(9)- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- Point-function obfuscation: a framework and generic constructions
- Obfuscation for Cryptographic Purposes
- Cryptographic password obfuscation
- Obfuscating Point Functions with Multibit Output
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- Obfuscating conjunctions
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- Obfuscation of hyperplane membership
This page was built for publication: Obfuscation for cryptographic purposes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2267356)