Using indistinguishability obfuscation via UCEs
DOI10.1007/978-3-662-45608-8_7zbMATH Open1317.94092OpenAlexW122561124MaRDI QIDQ2936604FDOQ2936604
Authors: Christina Brzuska, Arno Mittelbach
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_7
Recommendations
indistinguishability obfuscationdiffering-inputs obfuscationhardcore functionsuniversal computational extractors (UCEs)auxiliary-input obfuscationcorrelation-secure hash functionspoint-function obfuscation
Cited In (13)
- Point-function obfuscation: a framework and generic constructions
- Chosen ciphertext security via UCE
- Beyond Uber: instantiating generic groups via PGGs
- On the correlation intractability of obfuscated pseudorandom functions
- Public-seed pseudorandom permutations
- Instantiability of classical random-oracle-model encryption transforms
- Leakage resilient one-way functions: the auxiliary-input setting
- Towards forward security properties for PEKS and IBE
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- How to use indistinguishability obfuscation
- Contention in cryptoland: obfuscation, leakage and UCE
- Modeling random oracles under unpredictable queries
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
This page was built for publication: Using indistinguishability obfuscation via UCEs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936604)