On constructing one-way permutations from indistinguishability obfuscation
From MaRDI portal
Publication:2413613
DOI10.1007/S00145-017-9268-6zbMATH Open1400.94112OpenAlexW2755430954MaRDI QIDQ2413613FDOQ2413613
Publication date: 14 September 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9268-6
Recommendations
- On constructing one-way permutations from indistinguishability obfuscation
- Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
- One-Way Functions and (Im)perfect Obfuscation
- On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
- Limits on the power of indistinguishability obfuscation and functional encryption
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- A Pseudorandom Generator from any One-way Function
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Foundations of Cryptography
- Title not available (Why is that?)
- On the Black-Box Complexity of Optimally-Fair Coin Tossing
- Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle
- One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
- Title not available (Why is that?)
- Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments
- Bounds on the Efficiency of Generic Cryptographic Constructions
- Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?
- Theory of Cryptography
- Title not available (Why is that?)
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- On the power of nonuniformity in proofs of security
- Towards Non-Black-Box Lower Bounds in Cryptography
- How to use indistinguishability obfuscation
- The Dual BKR Inequality and Rudich's Conjecture
- Advances in Cryptology – CRYPTO 2004
- The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives
- Random-Oracle Uninstantiability from Indistinguishability Obfuscation
- On the (im)possibility of obfuscating programs
- Multi-input Functional Encryption
- Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
- Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Towards a Separation of Semantic and CCA Security for Public Key Encryption
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- On Virtual Grey Box Obfuscation for General Circuits
- Obfuscation of Probabilistic Circuits and Applications
- Indistinguishability Obfuscation from Compact Functional Encryption
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
- Perfect Structure on the Edge of Chaos
- Notions of Black-Box Reductions, Revisited
- On Black-Box Separations among Injective One-Way Functions
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- From Selective to Adaptive Security in Functional Encryption
- Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation
- On Basing Size-Verifiable One-Way Functions on NP-Hardness
- On Obfuscation with Random Oracles
- Two-Round Secure MPC from Indistinguishability Obfuscation
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions
- The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
- ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
- On the Power of Public-Key Encryption in Secure Computation
- The impossibility of basing one-way permutations on central cryptographic primitives
- On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations
Cited In (5)
- Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives
- On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations
- Adaptive security in SNARGs via iO and lossy functions
- One-Way Functions and (Im)perfect Obfuscation
- Title not available (Why is that?)
This page was built for publication: On constructing one-way permutations from indistinguishability obfuscation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2413613)