From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

From MaRDI portal
Publication:3181034

DOI10.1007/978-3-662-53644-5_15zbMath1400.94122OpenAlexW2532362725MaRDI QIDQ3181034

Alain Passelègue, Daniel Wichs, Ryo Nishimaki, Nir Bitansky

Publication date: 22 December 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53644-5_15




Related Items (26)

Impossibility of simulation secure functional encryption even with random oraclesFE and iO for Turing machines from minimal assumptionsFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSimpler constructions of asymmetric primitives from obfuscationIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)From minicrypt to obfustopia via private-key functional encryptionOptimal bounded-collusion secure functional encryptionFrom FE combiners to secure MPC and backPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)The pseudorandom oracle model and ideal obfuscationIndistinguishability obfuscationFunction-private functional encryption in the private-key settingMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsOn the complexity of compressing obfuscationFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsOn Removing Graded Encodings from Functional EncryptionCryptography with UpdatesCandidate iO from homomorphic encryption schemesConstrained pseudorandom functions from functional encryptionCandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECombiners for functional encryption, unconditionallyIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionAmplifying the security of functional encryption, unconditionally



Cites Work


This page was built for publication: From Cryptomania to Obfustopia Through Secret-Key Functional Encryption