Simpler constructions of asymmetric primitives from obfuscation
From MaRDI portal
Publication:2152062
DOI10.1007/978-3-030-65277-7_32zbMath1492.94104OpenAlexW2885058286MaRDI QIDQ2152062
Pooya Farshim, Alain Passelègue, Georg Fuchsbauer
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_32
public-key encryptionidentity-based encryptionpebblingobfuscationpredicate encryptionpuncturable PRFhierarchical IBE
Cites Work
- Unnamed Item
- Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Candidate iO from homomorphic encryption schemes
- On perfect correctness in (lockable) obfuscation
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- New techniques for obfuscating conjunctions
- Functional Encryption for Turing Machines
- Indistinguishability Obfuscation with Non-trivial Efficiency
- The Magic of ELFs
- Constrained Pseudorandom Functions and Their Applications
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Adaptive Security of Constrained PRFs
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- On the Communication Complexity of Secure Function Evaluation with Long Output
- Unbounded HIBE and Attribute-Based Encryption
- From Cryptomania to Obfustopia Through Secret-Key Functional Encryption
- Obfuscation of Hyperplane Membership
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Time/Space Trade-Offs for Reversible Computation
- Foundations of Cryptography
- Hierarchical ID-Based Cryptography
- Indistinguishability Obfuscation from Functional Encryption
- How to use indistinguishability obfuscation
- ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
- Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- Advances in Cryptology – CRYPTO 2004
- Functional Signatures and Pseudorandom Functions
- Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Witness encryption and its applications
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps
- New Negative Results on Differing-Inputs Obfuscation
- Chosen Ciphertext Security via Point Obfuscation