Indistinguishability Obfuscation from Functional Encryption

From MaRDI portal
Publication:4625660

DOI10.1145/3234511zbMath1407.94087OpenAlexW2900822322WikidataQ123120539 ScholiaQ123120539MaRDI QIDQ4625660

Nir Bitansky, Vinod Vaikuntanathan

Publication date: 25 February 2019

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/3234511




Related Items (59)

One-Way Functions and (Im)perfect ObfuscationA New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOPushing the limits of Valiant's universal circuits: simpler, tighter and more compactDeniable fully homomorphic encryption from learning with errors(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsImpossibility of simulation secure functional encryption even with random oraclesA simple construction of iO for Turing machinesSuccinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsMulti-input quadratic functional encryption from pairingsSimpler constructions of asymmetric primitives from obfuscationCryptanalysis of candidate obfuscators for affine determinant programsIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Dynamic collusion bounded functional encryption from identity-based encryptionFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionOptimal bounded-collusion secure functional encryptionFrom FE combiners to secure MPC and backQuantum attribute-based encryption: a comprehensive studyEfficient and scalable universal circuitsMulti-key and multi-input predicate encryption from learning with errorsBroadcast, trace and revoke with optimal parameters from polynomial hardnessStructure-preserving compilers from new notions of obfuscationsOn virtual grey box obfuscation for general circuitsMulti-client inner product encryption: function-hiding instantiations without random oracles(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linUnbounded predicate inner product functional encryption from pairingsBounded functional encryption for Turing machines: adaptive security from general assumptionsMulti-input quadratic functional encryption: stronger security, broader functionalityAdaptive multiparty NIKECollusion-resistant functional encryption for RAMsWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)The pseudorandom oracle model and ideal obfuscationMulti-input attribute based encryption and predicate encryptionUniversal ring signatures in the standard modelStreaming functional encryptionAdaptively simulation-secure attribute-hiding predicate encryptionCollusion Resistant Traitor Tracing from Learning with ErrorsFunctional encryption for cubic polynomials and implementationMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsOn the complexity of compressing obfuscationCandidate iO from homomorphic encryption schemesChosen Ciphertext Secure Functional Encryption from Constrained Witness PRFInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessSimple and generic constructions of succinct functional encryptionObfustopia built on secret-key functional encryptionSimple and efficient FE for quadratic functionsNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesCandidate iO from homomorphic encryption schemesCombiners for functional encryption, unconditionallyIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationAmplifying the security of functional encryption, unconditionallyUnnamed Item







This page was built for publication: Indistinguishability Obfuscation from Functional Encryption