Using indistinguishability obfuscation via UCEs
From MaRDI portal
Publication:2936604
Recommendations
Cited in
(13)- Point-function obfuscation: a framework and generic constructions
- Chosen ciphertext security via UCE
- Beyond Uber: instantiating generic groups via PGGs
- On the correlation intractability of obfuscated pseudorandom functions
- Public-seed pseudorandom permutations
- Instantiability of classical random-oracle-model encryption transforms
- Leakage resilient one-way functions: the auxiliary-input setting
- Towards forward security properties for PEKS and IBE
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Contention in cryptoland: obfuscation, leakage and UCE
- How to use indistinguishability obfuscation
- Modeling random oracles under unpredictable queries
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
This page was built for publication: Using indistinguishability obfuscation via UCEs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936604)