Succinct Randomized Encodings and their Applications

From MaRDI portal
Publication:2941536

DOI10.1145/2746539.2746574zbMath1321.94041OpenAlexW2101230806MaRDI QIDQ2941536

Sidharth Telang, Huijia Lin, Nir Bitansky, Rafael Pass, Sanjam Garg

Publication date: 21 August 2015

Published in: Proceedings of the forty-seventh annual ACM symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2746539.2746574




Related Items (40)

Security definitions on time-lock puzzlesA simple construction of iO for Turing machinesSuccinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsSecure Multiparty RAM Computation in Constant RoundsDelegating RAM Computations with Adaptive Soundness and PrivacyAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseDelegating RAM ComputationsFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSNARGs for P from sub-exponential DDH and QRIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsFrom cryptomania to obfustopia through secret-key functional encryptionOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionLaconic function evaluation for Turing machinesTransparent batchable time-lock puzzles and applications to Byzantine consensusMemory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesCollusion-resistant functional encryption for RAMsTime-release cryptography from minimal circuit assumptionsUniversal ring signatures in the standard modelFully-succinct publicly verifiable delegation from constant-size assumptionsSuccinct LWE sampling, random polynomials, and obfuscationStructure Versus Hardness Through the Obfuscation LensRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionCryptography with UpdatesNo-signaling linear PCPsOutput-Compressing Randomized Encodings and ApplicationsFunctional Encryption for Turing MachinesCryptographic Assumptions: A Position PaperNo-signaling linear PCPsOblivious Parallel RAM and ApplicationsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Adaptively secure MPC with sublinear communication complexityObfuscation CombinersOn the Existence of Extractable One-Way FunctionsSpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationConstant-Round Interactive Proofs for Delegating ComputationGarbled Circuits as Randomized Encodings of Functions: a PrimerPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software


Uses Software


Cites Work


This page was built for publication: Succinct Randomized Encodings and their Applications