Candidate obfuscation via oblivious LWE sampling

From MaRDI portal
Publication:2056783

DOI10.1007/978-3-030-77883-5_5zbMath1479.94270OpenAlexW3089736144MaRDI QIDQ2056783

Hoeteck Wee, Daniel Wichs

Publication date: 8 December 2021

Full work available at URL: https://doi.org/10.1007/978-3-030-77883-5_5



Related Items

Hidden cosets and applications to unclonable cryptography, Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration, Counterexamples to new circular security assumptions underlying iO, Cryptanalysis of candidate obfuscators for affine determinant programs, Incompressible cryptography, Optimal broadcast encryption and CP-ABE from evasive lattice assumptions, Multi-key and multi-input predicate encryption from learning with errors, Broadcast, trace and revoke with optimal parameters from polynomial hardness, Laconic function evaluation for Turing machines, Structure-preserving compilers from new notions of obfuscations, Functional encryption against probabilistic queries: definition, construction and applications, Witness encryption and null-iO from evasive LWE, Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \), Another round of breaking and making quantum money: how to not build it from lattices, and more, Candidate witness encryption from lattice techniques, Lockable obfuscation from circularly insecure fully homomorphic encryption, Instantiability of classical random-oracle-model encryption transforms, Constant input attribute based (and predicate) encryption from evasive and tensor LWE, Tracing quantum state distinguishers via backtracking, Secure software leasing from standard assumptions, Succinct LWE sampling, random polynomials, and obfuscation, On the complexity of compressing obfuscation, Candidate iO from homomorphic encryption schemes, Obfustopia built on secret-key functional encryption, Secure software leasing, Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments, Non-interactive anonymous router



Cites Work