On Best-Possible Obfuscation

From MaRDI portal
Publication:3596381

DOI10.1007/978-3-540-70936-7_11zbMath1129.94023OpenAlexW2152144666MaRDI QIDQ3596381

Guy N. Rothblum

Publication date: 30 August 2007

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_11




Related Items (33)

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOSecure computation from one-way noisy communication, or: anti-correlation via anti-concentrationBest possible information-theoretic MPCVirtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic AgentsDesigning Proof of Human-Work Puzzles for Cryptocurrency and BeyondProofs of Work from worst-case assumptionsStructure-preserving compilers from new notions of obfuscationsOn virtual grey box obfuscation for general circuitsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationHow to Generate and Use Universal SamplersThe pseudorandom oracle model and ideal obfuscationThe final nail in the coffin of statistically-secure obfuscatorBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationSuccinct LWE sampling, random polynomials, and obfuscationVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESObfuscating conjunctionsOn the complexity of compressing obfuscationRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionObfuscation for cryptographic purposesOn strong simulation and composable point obfuscationCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsUnnamed ItemCandidate obfuscation via oblivious LWE samplingUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionOn Statistically Secure Obfuscation with Approximate CorrectnessTowards Security Notions for White-Box CryptographyLeakage resilience from program obfuscationHow to Use Indistinguishability Obfuscation: Deniable Encryption, and MoreObfuscation of Hyperplane MembershipA decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareAd Hoc PSM Protocols: Secure Computation Without Coordination






This page was built for publication: On Best-Possible Obfuscation