Indistinguishability Obfuscation from Compact Functional Encryption

From MaRDI portal
Publication:3457116

DOI10.1007/978-3-662-47989-6_15zbMath1336.94035OpenAlexW1419302722MaRDI QIDQ3457116

Abhishek Jain, Prabhanjan V. Ananth

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_15




Related Items (93)

One-Way Functions and (Im)perfect ObfuscationA New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iODeniable fully homomorphic encryption from learning with errors(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsUpgrading to functional encryptionImpossibility of simulation secure functional encryption even with random oraclesCiphertext expansion in limited-leakage order-preserving encryption: a tight computational lower boundA simple construction of iO for Turing machinesSuccinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsMulti-input quadratic functional encryption from pairingsLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionDelegating RAM Computations with Adaptive Soundness and PrivacySemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSingle-Key to Multi-Key Functional Encryption with Polynomial LossCompactness vs Collusion Resistance in Functional EncryptionCryptanalysis of candidate obfuscators for affine determinant programsIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Dynamic collusion bounded functional encryption from identity-based encryptionFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionOptimal bounded-collusion secure functional encryptionFrom FE combiners to secure MPC and backOn constructing one-way permutations from indistinguishability obfuscationMulti-key and multi-input predicate encryption from learning with errorsBroadcast, trace and revoke with optimal parameters from polynomial hardnessStructure-preserving compilers from new notions of obfuscationsOn virtual grey box obfuscation for general circuitsMulti-input Functional Encryption with Unbounded-Message SecurityVerifiable Functional EncryptionFunctional encryption against probabilistic queries: definition, construction and applications(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linBounded functional encryption for Turing machines: adaptive security from general assumptionsMulti-input quadratic functional encryption: stronger security, broader functionalityAdaptive multiparty NIKECollusion-resistant functional encryption for RAMsWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)The pseudorandom oracle model and ideal obfuscationMulti-input attribute based encryption and predicate encryptionConstrained (Verifiable) Pseudorandom Function from Functional EncryptionMore efficient verifiable functional encryptionUniversal ring signatures in the standard modelNonmalleable digital lockers and robust fuzzy extractors in the plain modelStreaming functional encryptionConstant input attribute based (and predicate) encryption from evasive and tensor LWEIndistinguishability obfuscationMulti-party functional encryptionSuccinct LWE sampling, random polynomials, and obfuscationAdaptively simulation-secure attribute-hiding predicate encryptionFunctional broadcast encryption with applications to data sharing for cloud storagePractical Order-Revealing Encryption with Limited LeakageFunctional encryption for cubic polynomials and implementationMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsOn the complexity of compressing obfuscationRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsMulti-input Inner-Product Functional Encryption from PairingsOn Removing Graded Encodings from Functional EncryptionCryptography with UpdatesCandidate iO from homomorphic encryption schemesInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessSimple and generic constructions of succinct functional encryptionIndistinguishability Obfuscation: From Approximate to ExactOutput-Compressing Randomized Encodings and ApplicationsFunctional Encryption for Turing MachinesPerfect Structure on the Edge of ChaosObfustopia built on secret-key functional encryptionFunctional Encryption Without ObfuscationOn Constructing One-Way Permutations from Indistinguishability ObfuscationConstrained pseudorandom functions from functional encryptionSimple and efficient FE for quadratic functionsNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesCandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECombiners for functional encryption, unconditionallyImpossibility results for lattice-based functional encryption schemesIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionObfuscation CombinersRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationAmplifying the security of functional encryption, unconditionallyUnnamed ItemPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareBreaking the Sub-Exponential Barrier in ObfustopiaLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program Obfuscators



Cites Work


This page was built for publication: Indistinguishability Obfuscation from Compact Functional Encryption