Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
DOI10.1007/978-3-662-44371-2_11zbMATH Open1317.94091OpenAlexW2115221574MaRDI QIDQ2874504FDOQ2874504
Authors: Christina Brzuska, Pooya Farshim, Arno Mittelbach
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://eprints.whiterose.ac.uk/153478/1/2014_099.pdf
Recommendations
random oracleindistinguishability obfuscation (iO)randomized encodingsuniversal computational extractors (UCEs)
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17)
Cited In (21)
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
- Lossy key encapsulation mechanism and its applications
- Point-function obfuscation: a framework and generic constructions
- Searching for ELFs in the cryptographic forest
- The magic of ELFs
- Strong hardness of privacy from weak traitor tracing
- Chosen ciphertext security via UCE
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- Big-key symmetric encryption: resisting key exfiltration
- Beyond Uber: instantiating generic groups via PGGs
- Public-seed pseudorandom permutations
- Using indistinguishability obfuscation via UCEs
- Contention in cryptoland: obfuscation, leakage and UCE
- The Magic of ELFs
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- Security definitions for hash functions: combining UCE and indifferentiability
- Toward RSA-OAEP without random oracles
- Instantiating random oracles via UCEs
- Compact key storage. A modern approach to key backup and delegation
- Modeling random oracles under unpredictable queries
- Upgrading fuzzy extractors
This page was built for publication: Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2874504)