Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings

From MaRDI portal
Publication:2874522

DOI10.1007/978-3-662-44371-2_28zbMath1343.94076OpenAlexW386218400MaRDI QIDQ2874522

Sidharth Telang, Rafael Pass, Karn Seth

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_28




Related Items

One-Way Functions and (Im)perfect ObfuscationThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOCutting-edge cryptography through the lens of secret sharingSecure Obfuscation in a Weak Multilinear Map ModelVirtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic AgentsCompactness vs Collusion Resistance in Functional EncryptionOn the bit security of cryptographic primitivesHomomorphic lower digits removal and improved FHE bootstrappingAnonymous IBE, leakage resilience and circular security from new assumptionsSecret-sharing for NPProofs of Work from worst-case assumptionsStructure-preserving compilers from new notions of obfuscationsOn virtual grey box obfuscation for general circuitsSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applications(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linCryptanalysis of the CLT13 multilinear mapNonmalleable digital lockers and robust fuzzy extractors in the plain modelIndistinguishability obfuscationHardness of Continuous Local Search: Query Complexity and Cryptographic Lower BoundsFunctional broadcast encryption with applications to data sharing for cloud storageEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsZeroizing Attacks on Indistinguishability Obfuscation over CLT13Functional Encryption: Deterministic to Randomized Functions from Simple AssumptionsReusable fuzzy extractors for low-entropy distributionsImpossibility of VBB Obfuscation with Ideal Constant-Degree Graded EncodingsLower Bounds on Assumptions Behind Indistinguishability ObfuscationIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsCryptographic Assumptions: A Position PaperObfustopia built on secret-key functional encryptionHow to Avoid Obfuscation Using Witness PRFsCutting-Edge Cryptography Through the Lens of Secret SharingFunctional Encryption Without ObfuscationContention in Cryptoland: Obfuscation, Leakage and UCEPoint-Function Obfuscation: A Framework and Generic ConstructionsObfuscating circuits via composite-order graded encodingConstrained pseudorandom functions from functional encryptionNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationShorter Circuit Obfuscation in Challenging Security ModelsUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionObfuscation CombinersRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Breaking the Sub-Exponential Barrier in ObfustopiaCryptanalyses of Candidate Branching Program Obfuscators