Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification

From MaRDI portal
Publication:2304923

DOI10.1007/978-3-030-26954-8_10zbMath1436.94030OpenAlexW2967113598MaRDI QIDQ2304923

Amit Sahai, Christian Matt, Aayush Jain, Huijia Lin, Prabhanjan V. Ananth

Publication date: 9 March 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-26954-8_10




Related Items (35)

One-Way Functions and (Im)perfect ObfuscationCounterexamples to new circular security assumptions underlying iOMulti-input quadratic functional encryption from pairingsFunctional encryption for Turing machines with dynamic bounded collusion from LWEConstructions for quantum indistinguishability obfuscationAttribute-based access control for inner product functional encryption from LWECryptanalysis of candidate obfuscators for affine determinant programsIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Matrix PRFs: constructions, attacks, and applications to obfuscationOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionUnbounded quadratic functional encryption and more from pairingsStructure-preserving compilers from new notions of obfuscationsOn the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generatorIdentity-based encryption in DDH hard groupsFunctional encryption with secure key leasingWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Candidate witness encryption from lattice techniquesMulti-input attribute based encryption and predicate encryptionLockable obfuscation from circularly insecure fully homomorphic encryptionStreaming functional encryptionIndistinguishability obfuscationSuccinct LWE sampling, random polynomials, and obfuscationShort attribute-based signatures for arbitrary Turing machines from standard assumptionsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationCandidate iO from homomorphic encryption schemesObfustopia built on secret-key functional encryptionCandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECombiners for functional encryption, unconditionallyIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingNon-interactive distributional indistinguishability (NIDI) and non-malleable commitmentsAmplifying the security of functional encryption, unconditionallyFiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs




This page was built for publication: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification