Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
From MaRDI portal
Publication:2936603
DOI10.1007/978-3-662-45608-8_6zbMath1317.94085OpenAlexW2158246155MaRDI QIDQ2936603
Stefano Tessaro, Igors Stepanovs, Mihir Bellare
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_6
Related Items (23)
Non-malleable functions and their applications ⋮ Fiat-Shamir for highly sound protocols is instantiable ⋮ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation ⋮ On constructing one-way permutations from indistinguishability obfuscation ⋮ Structure-preserving compilers from new notions of obfuscations ⋮ On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input ⋮ Towards Proofs of Ownership Beyond Bounded Leakage ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Better Two-Round Adaptive Multi-party Computation ⋮ Predictable Arguments of Knowledge ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness ⋮ On the Correlation Intractability of Obfuscated Pseudorandom Functions ⋮ How to Avoid Obfuscation Using Witness PRFs ⋮ On Constructing One-Way Permutations from Indistinguishability Obfuscation ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ Session resumption protocols and efficient forward security for TLS 1.3 0-RTT ⋮ Signatures Resilient to Uninvertible Leakage ⋮ The magic of ELFs ⋮ The Magic of ELFs
This page was built for publication: Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation