Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation

From MaRDI portal
Publication:2874521

DOI10.1007/978-3-662-44371-2_27zbMath1310.94130OpenAlexW288529411MaRDI QIDQ2874521

Dan Boneh, Mark Zhandry

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_27




Related Items (60)

One-Way Functions and (Im)perfect ObfuscationTraceable secret sharing and applicationsCutting-edge cryptography through the lens of secret sharingTraitor-tracing from LWE made simple and attribute-basedThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksWhite box traitor tracingLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionSeparating Computational and Statistical Differential Privacy in the Client-Server ModelStrong Hardness of Privacy from Weak Traitor TracingConstructions for quantum indistinguishability obfuscationSimpler constructions of asymmetric primitives from obfuscationSecret-sharing for NPIncompressible cryptographyOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsNew approaches to traitor tracing with embedded identitiesAlgebraic generalization of Diffie-Hellman key exchangeOn constructing one-way permutations from indistinguishability obfuscationMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsTraitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-LinMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsHardness of \(k\)-LWE and applications in traitor tracingHow to Generate and Use Universal SamplersPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessOffline Assisted Group Key ExchangeOn the worst-case inefficiency of CGKAAdaptive multiparty NIKEWatermarkable public key encryption with efficient extraction under standard assumptionsFine-grained non-interactive key-exchange: constructions and lower boundsBeyond software watermarking: traitor-tracing for pseudorandom functionsHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreIndistinguishability obfuscationTowards tight adaptive security of non-interactive key exchangeNIKE from affine determinant programsOne-Round Cross-Domain Group Key Exchange Protocol in the Standard ModelCollusion Resistant Traitor Tracing from Learning with ErrorsGeneric hardness of inversion on ring and its relation to self-bilinear mapConstraining Pseudorandom Functions PrivatelyUniversal Samplers with Fast VerificationPrivate Puncturable PRFs from Standard Lattice AssumptionsCandidate iO from homomorphic encryption schemesDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessRound-Optimal Password-Based Group Key Exchange Protocols in the Standard ModelVerifiable random functions from non-interactive witness-indistinguishable proofsOrder-Revealing Encryption and the Hardness of Private LearningReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityHow to Avoid Obfuscation Using Witness PRFsCutting-Edge Cryptography Through the Lens of Secret SharingFunctional Encryption Without ObfuscationOn Constructing One-Way Permutations from Indistinguishability ObfuscationConstrained pseudorandom functions from functional encryptionCandidate iO from homomorphic encryption schemesConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationSender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocolLeakage-resilient key exchange and two-seed extractorsAdaptively secure constrained pseudorandom functions in the standard modelNew techniques for traitor tracing: size \(N^{1/3}\) and more from pairingsThe Complexity of Differential PrivacyBreaking the Sub-Exponential Barrier in ObfustopiaLattice-Based SNARGs and Their Application to More Efficient Obfuscation




This page was built for publication: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation