How to use indistinguishability obfuscation
From MaRDI portal
Publication:5259583
DOI10.1145/2591796.2591825zbMATH Open1315.94102OpenAlexW1984153141WikidataQ130858505 ScholiaQ130858505MaRDI QIDQ5259583FDOQ5259583
Publication date: 26 June 2015
Published in: Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2591796.2591825
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Theory of Cryptography
- The geometry of differential privacy: the small database and approximate cases
- On the geometry of differential privacy
- Interactive privacy via the median mechanism
- The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
- Lower Bounds in Differential Privacy
- Iterative Constructions and Private Data Release
- Differential Privacy and the Fat-Shattering Dimension of Linear Queries
- Our Data, Ourselves: Privacy Via Distributed Noise Generation
- On the complexity of differentially private data release
- Collusion-secure fingerprinting for digital data
- Advances in Cryptology โ CRYPTO 2004
- New Efficient Attacks on Statistical Disclosure Control Mechanisms
- Bounds on the Sample Complexity for Private Learning and Private Data Release
- Answering n {2+o(1)} counting queries with differential privacy is hard
- Characterizing the sample complexity of private learners
- Faster Algorithms for Privately Releasing Marginals
- Faster private release of marginals on small databases
- Private Learning and Sanitization: Pure vs. Approximate Differential Privacy
- Privately releasing conjunctions and the statistical query barrier
- Efficient algorithms for privately releasing marginals via convex relaxations
Cited In (only showing first 100 items - show all)
- How to Generate and Use Universal Samplers
- Better Two-Round Adaptive Multi-party Computation
- Constraining Pseudorandom Functions Privately
- From Minicrypt to Obfustopia via Private-Key Functional Encryption
- On Removing Graded Encodings from Functional Encryption
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps
- Private Puncturable PRFs from Standard Lattice Assumptions
- Succinct classical verification of quantum computation
- Indistinguishability Obfuscation: From Approximate to Exact
- Pseudorandom Functions: Three Decades Later
- Quantum Homomorphic Encryption for Polynomial-Sized Circuits
- Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs
- Signatures Resilient to Uninvertible Leakage
- Function-private functional encryption in the private-key setting
- Quantum-access-secure message authentication via blind-unforgeability
- Cutting-edge cryptography through the lens of secret sharing
- Upgrading to functional encryption
- A simple construction of iO for Turing machines
- FE and iO for Turing machines from minimal assumptions
- Succinct garbling schemes from functional encryption through a local simulation paradigm
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Towards breaking the exponential barrier for general secret sharing
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange
- Survey of information security
- FiatโShamir for Highly Sound Protocols Is Instantiable
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Structure Versus Hardness Through the Obfuscation Lens
- Fiat-Shamir for highly sound protocols is instantiable
- From cryptomania to obfustopia through secret-key functional encryption
- From minicrypt to obfustopia via private-key functional encryption
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Point-Function Obfuscation: A Framework and Generic Constructions
- On the complexity of compressing obfuscation
- Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
- Secret-sharing for NP
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
- On the bit security of cryptographic primitives
- Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
- Output-Compressing Randomized Encodings and Applications
- Perfect Structure on the Edge of Chaos
- Cutting-Edge Cryptography Through the Lens of Secret Sharing
- How to Avoid Obfuscation Using Witness PRFs
- Fine-Grained Cryptography
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
- Strong Hardness of Privacy from Weak Traitor Tracing
- A counterexample to the chain rule for conditional HILL entropy
- Certifying trapdoor permutations, revisited
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- On the Correlation Intractability of Obfuscated Pseudorandom Functions
- Compactness vs Collusion Resistance in Functional Encryption
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- Single-Key to Multi-Key Functional Encryption with Polynomial Loss
- Proofs of Work from worst-case assumptions
- Constructions for quantum indistinguishability obfuscation
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Adaptively secure MPC with sublinear communication complexity
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Non-interactive zero-knowledge in pairing-free groups from weaker assumptions
- CCA-Secure Keyed-Fully Homomorphic Encryption
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- On virtual grey box obfuscation for general circuits
- On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Symmetric Key Exchange with Full Forward Security and Robust Synchronization
- The Complexity of Public-Key Cryptography
- One-Way Functions and (Im)perfect Obfuscation
- An efficient structural attack on NIST submission DAGS
- Dynamic collusion bounded functional encryption from identity-based encryption
- Optimal bounded-collusion secure functional encryption
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- Breaking the Sub-Exponential Barrier in Obfustopia
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
- Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
- Leakage resilience from program obfuscation
- Delegation with updatable unambiguous proofs and PPAD-hardness
- KDM security for identity-based encryption: constructions and separations
- Functional broadcast encryption with applications to data sharing for cloud storage
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Constraining and Watermarking PRFs from Milder Assumptions
- Watermarking Cryptographic Capabilities
- Hidden cosets and applications to unclonable cryptography
- On constructing one-way permutations from indistinguishability obfuscation
- Toward non-interactive zero-knowledge proofs for NP from LWE
- Title not available (Why is that?)
- Bounded KDM Security from iO and OWF
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Subverting deniability
- The magic of ELFs
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
- Witness Maps and Applications
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Deniable fully homomorphic encryption from learning with errors
- Universal ring signatures in the standard model
- Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation
- Cryptography with Updates
- Succinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?
Uses Software
Recommendations
- Indistinguishability Obfuscation from Compact Functional Encryption ๐ ๐
- Indistinguishability Obfuscation from Functional Encryption ๐ ๐
- Indistinguishability Obfuscation: From Approximate to Exact ๐ ๐
- Indistinguishability Obfuscation with Non-trivial Efficiency ๐ ๐
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption ๐ ๐
- Practical Deniable Encryption ๐ ๐
- Using Indistinguishability Obfuscation via UCEs ๐ ๐
- Indistinguishability obfuscation from circular security ๐ ๐
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More ๐ ๐
- Title not available (Why is that?) ๐ ๐
This page was built for publication: How to use indistinguishability obfuscation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5259583)