Obfuscation for cryptographic purposes
From MaRDI portal
Publication:2267356
DOI10.1007/S00145-009-9046-1zbMATH Open1181.94096OpenAlexW2049843043MaRDI QIDQ2267356FDOQ2267356
Authors: Martijn Stam, Dennis Hofheinz, John Malone-Lee
Publication date: 1 March 2010
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://infoscience.epfl.ch/record/172912/files/paper.pdf
Recommendations
Cites Work
- Probabilistic encryption
- The asymptotic distribution of the supremum of the standardized empirical distribution function on subintervals
- New directions in cryptography
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Title not available (Why is that?)
- Theory of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Complete characterization of security notions for probabilistic private-key encryption
- Title not available (Why is that?)
- Private Searching on Streaming Data
- How to Shuffle in Public
- Software protection and simulation on oblivious RAMs
- Correcting errors without leaking partial information
- Deterministic and Efficiently Searchable Encryption
- Title not available (Why is that?)
- On obfuscating point functions
- On Best-Possible Obfuscation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Obfuscation for Cryptographic Purposes
- Securely Obfuscating Re-encryption
Cited In (9)
- Obfuscation of hyperplane membership
- Point-function obfuscation: a framework and generic constructions
- Obfuscation for Cryptographic Purposes
- Cryptographic password obfuscation
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- Obfuscating Point Functions with Multibit Output
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- Obfuscating conjunctions
This page was built for publication: Obfuscation for cryptographic purposes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2267356)