Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
From MaRDI portal
Publication:2056782
DOI10.1007/978-3-030-77883-5_4zbMATH Open1479.94177OpenAlexW3037475319MaRDI QIDQ2056782FDOQ2056782
Authors: Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77883-5_4
Recommendations
- Indistinguishability obfuscation from functional encryption
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- Breaking the sub-exponential barrier in obfustopia
- Indistinguishability obfuscation from compact functional encryption
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
Cites Work
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- On lattices, learning with errors, random linear codes, and cryptography
- Functional encryption: definitions and challenges
- Title not available (Why is that?)
- Fuzzy Identity-Based Encryption
- New Algorithms for Learning in Presence of Errors
- Title not available (Why is that?)
- (Leveled) fully homomorphic encryption without bootstrapping
- Candidate one-way functions based on expander graphs
- On the security of Goldreich's one-way function
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- A dichotomy for local small-bias generators
- How to use indistinguishability obfuscation
- Pseudorandom generators with long stretch and low locality from random local one-way functions
- Functional encryption with bounded collusions via multi-party computation
- Simple functional encryption schemes for inner products
- Multi-input functional encryption
- Reusable garbled circuits and succinct functional encryption
- Title not available (Why is that?)
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Fully secure functional encryption for inner products, from standard assumptions
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Indistinguishability obfuscation from compact functional encryption
- Indistinguishability obfuscation from functional encryption
- A new paradigm for public-key functional encryption for degree-2 polynomials
- From cryptomania to obfustopia through secret-key functional encryption
- Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
- Functional encryption for bounded collusions, revisited
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
- Indistinguishability obfuscation from semantically-secure multilinear encodings
- Indistinguishability obfuscation for Turing machines with unbounded memory
- Secure Obfuscation in a Weak Multilinear Map Model
- From selective to adaptive security in functional encryption
- One-Time Programs
- Watermarking cryptographic capabilities
- Protecting obfuscation against algebraic attacks
- Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps
- Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits
- Hardness of SIS and LWE with small parameters
- Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
- Indistinguishability obfuscation from constant-degree graded encoding schemes
- Predicate encryption for circuits from LWE
- Sum of squares lower bounds for refuting any CSP
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- Revisiting the hardness of binary error LWE
- How to Generate and Use Universal Samplers
- On the concrete security of Goldreich's pseudorandom generator
- On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack
- Candidate iO from homomorphic encryption schemes
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Algebraic attacks against random local functions and their countermeasures
- Title not available (Why is that?)
Cited In (37)
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
- Candidate iO from homomorphic encryption schemes
- Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Counterexamples to new circular security assumptions underlying iO
- Indistinguishability obfuscation from compact functional encryption
- Fine-grained polynomial functional encryption
- Breaking the sub-exponential barrier in obfustopia
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- Registered (inner-product) functional encryption
- Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
- Unbounded quadratic functional encryption and more from pairings
- Candidate witness encryption from lattice techniques
- Simpler constructions of asymmetric primitives from obfuscation
- Indistinguishability obfuscation
- On the algebraic immunity of direct sum constructions
- Cryptanalysis of candidate obfuscators for affine determinant programs
- Candidate obfuscation via oblivious LWE sampling
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments
- Time-lock puzzles with efficient batch solving
- Multi-input attribute based encryption and predicate encryption
- Constructions for quantum indistinguishability obfuscation
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- Succinct LWE sampling, random polynomials, and obfuscation
- Indistinguishability obfuscation, range avoidance, and bounded arithmetic
- NP-hardness of approximating meta-complexity: a cryptographic approach
- Obfuscation of pseudo-deterministic quantum circuits
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- On the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generator
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- Witness encryption and null-iO from evasive LWE
- Complexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Short attribute-based signatures for arbitrary Turing machines from standard assumptions
- A minor note on obtaining simpler iO constructions via depleted obfuscators
This page was built for publication: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056782)