On obfuscating point functions

From MaRDI portal
Publication:3581448

DOI10.1145/1060590.1060669zbMath1192.94109OpenAlexW2159460804MaRDI QIDQ3581448

Hoeteck Wee

Publication date: 16 August 2010

Published in: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1060590.1060669



Related Items

Impossibility of quantum virtual black-box obfuscation of classical circuits, The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO, Limits on the Power of Indistinguishability Obfuscation and Functional Encryption, Another step towards realizing random oracles: non-malleable point obfuscation, Homomorphic lower digits removal and improved FHE bootstrapping, Bootstrapping for approximate homomorphic encryption, Unclonable polymers and their cryptographic applications, Obfuscated fuzzy Hamming distance and conjunctions from subset product problems, The function-inversion problem: barriers and opportunities, Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications, Structure-preserving compilers from new notions of obfuscations, On virtual grey box obfuscation for general circuits, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Multi-input Functional Encryption with Unbounded-Message Security, How to obfuscate MPC inputs, Revisiting time-space tradeoffs for function inversion, Time-space tradeoffs for sponge hashing: attacks and limitations for short collisions, Lockable obfuscation from circularly insecure fully homomorphic encryption, Unifying presampling via concentration bounds, Securely obfuscating re-encryption, Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption, Obfuscating conjunctions, Obfuscation for cryptographic purposes, Basing Weak Public-Key Cryptography on Strong One-Way Functions, On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models, Cryptographic Assumptions: A Position Paper, Contention in Cryptoland: Obfuscation, Leakage and UCE, Point-Function Obfuscation: A Framework and Generic Constructions, On best-possible obfuscation, On strong simulation and composable point obfuscation, New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries, Password hashing and preprocessing, Secure Obfuscation of Encrypted Verifiable Encrypted Signatures, Signatures Resilient to Uninvertible Leakage, Towards Security Notions for White-Box Cryptography, The magic of ELFs, The Magic of ELFs, On Symmetric Encryption and Point Obfuscation, Obfuscation of Hyperplane Membership, A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation, Instantiation of quantum point obfuscation