On the existence of extractable one-way functions

From MaRDI portal
Publication:5259586

DOI10.1145/2591796.2591859zbMath1315.94059OpenAlexW2090853363MaRDI QIDQ5259586

Omer Paneth, Alon Rosen, Nir Bitansky, Ran Canetti

Publication date: 26 June 2015

Published in: Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/1721.1/107895




Related Items (30)

Practical algorithm substitution attack on extractable signaturesToward RSA-OAEP Without Random Oracles3-Message Zero Knowledge Against Human IgnoranceOn the (In)Security of SNARKs in the Presence of OraclesA note on perfect correctness by derandomizationOn the (In)security of Kilian-based SNARGsOn Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionOn the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary inputNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionA Shuffle Argument Secure in the Generic ModelBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsKnowledge encryption and its applications to simulatable protocols with low round-complexityPublic-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hashTo label, or not to label (in generic groups)Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscationThe hunting of the SNARKNon-interactive zero-knowledge from non-interactive batch argumentsReductions in \textbf{PPP}Magic Adversaries Versus Individual Reduction: Science Wins Either WayContention in Cryptoland: Obfuscation, Leakage and UCEPoint-Function Obfuscation: A Framework and Generic ConstructionsOn subversion-resistant SNARKsThe magic of ELFsThe Magic of ELFsCompressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmicsA Note on Perfect Correctness by DerandomizationLattice-Based SNARGs and Their Application to More Efficient ObfuscationWeak Zero-Knowledge beyond the Black-Box BarrierOn instantiating the algebraic group model from falsifiable assumptionsSuccinct non-interactive secure computation


Uses Software


Cites Work




This page was built for publication: On the existence of extractable one-way functions