How to Obfuscate Programs Directly

From MaRDI portal
Publication:2948392

DOI10.1007/978-3-662-46803-6_15zbMath1371.68054OpenAlexW1871911207MaRDI QIDQ2948392

Joe Zimmerman

Publication date: 30 September 2015

Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_15




Related Items (42)

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOPushing the limits of Valiant's universal circuits: simpler, tighter and more compactCutting-edge cryptography through the lens of secret sharingThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksOn the bit security of cryptographic primitivesHomomorphic lower digits removal and improved FHE bootstrappingAnonymous IBE, leakage resilience and circular security from new assumptionsProofs of Work from worst-case assumptionsPublic-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applicationsThe random oracle model: a twenty-year retrospectiveMultilinear maps from obfuscationEfficient and scalable universal circuitsOn virtual grey box obfuscation for general circuitsCryptanalysis of the CLT13 multilinear mapEfficient and Provable White-Box PrimitivesPractical Order-Revealing Encryption with Limited LeakageEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationConstraining Pseudorandom Functions PrivatelyUniversal Samplers with Fast VerificationZeroizing Attacks on Indistinguishability Obfuscation over CLT13Separating IND-CPA and Circular Security for Unbounded Length Key CyclesRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsMultilinear Maps from ObfuscationPerfect Structure on the Edge of ChaosHow to build time-lock encryptionObfustopia built on secret-key functional encryptionHow to Avoid Obfuscation Using Witness PRFsObfuscating circuits via composite-order graded encodingConstrained pseudorandom functions from functional encryptionNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEShorter Circuit Obfuscation in Challenging Security ModelsRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program Obfuscators







This page was built for publication: How to Obfuscate Programs Directly