Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation

From MaRDI portal
Publication:2292644

DOI10.1007/978-3-030-17653-2_7zbMath1470.94072OpenAlexW2946470030MaRDI QIDQ2292644

Shweta Agrawal

Publication date: 4 February 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-17653-2_7




Related Items (32)

One-Way Functions and (Im)perfect ObfuscationSecure computation from one-way noisy communication, or: anti-correlation via anti-concentrationCounterexamples to new circular security assumptions underlying iOFunctional encryption for Turing machines with dynamic bounded collusion from LWECryptanalysis of candidate obfuscators for affine determinant programsOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsMatrix PRFs: constructions, attacks, and applications to obfuscationBroadcast, trace and revoke with optimal parameters from polynomial hardnessIdentity-based encryption in DDH hard groupsA polynomial time algorithm for breaking NTRU encryption with multiple keysWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Candidate witness encryption from lattice techniquesMulti-input attribute based encryption and predicate encryptionLockable obfuscation from circularly insecure fully homomorphic encryptionStreaming functional encryptionConstant input attribute based (and predicate) encryption from evasive and tensor LWETracing quantum state distinguishers via backtrackingIndistinguishability obfuscationSuccinct LWE sampling, random polynomials, and obfuscationOffline witness encryption with semi-adaptive securityCandidate iO from homomorphic encryption schemesObfustopia built on secret-key functional encryptionOptimal broadcast encryption from pairings and LWECandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECombiners for functional encryption, unconditionallyClassical vs quantum random oraclesIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingNon-interactive distributional indistinguishability (NIDI) and non-malleable commitmentsAmplifying the security of functional encryption, unconditionally




This page was built for publication: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation