On the existence of extractable one-way functions
From MaRDI portal
Publication:5259586
DOI10.1145/2591796.2591859zbMATH Open1315.94059OpenAlexW2090853363MaRDI QIDQ5259586FDOQ5259586
Authors: Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
Publication date: 26 June 2015
Published in: Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/1721.1/107895
Recommendations
Cites Work
- Theory of Cryptography
- On the geometry of differential privacy
- Interactive privacy via the median mechanism
- The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
- Lower bounds in differential privacy
- Iterative Constructions and Private Data Release
- Differential privacy and the fat-shattering dimension of linear queries
- Our Data, Ourselves: Privacy Via Distributed Noise Generation
- On the complexity of differentially private data release, efficient algorithms and hardness results
- Title not available (Why is that?)
- Collusion-secure fingerprinting for digital data
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- New Efficient Attacks on Statistical Disclosure Control Mechanisms
- Bounds on the sample complexity for private learning and private data release
- Answering \(n^{2+o(1)}\) counting queries with differential privacy is hard
- Characterizing the sample complexity of private learners
- Faster algorithms for privately releasing marginals
- Faster private release of marginals on small databases
- Private Learning and Sanitization: Pure vs. Approximate Differential Privacy
- Efficient algorithms for privately releasing marginals via convex relaxations
Cited In (40)
- Succinct non-interactive secure computation
- Knowledge encryption and its applications to simulatable protocols with low round-complexity
- A simple and efficient framework of proof systems for NP
- On the (In)security of Kilian-based SNARGs
- Reductions in \textbf{PPP}
- Practical algorithm substitution attack on extractable signatures
- On extractability obfuscation
- Point-function obfuscation: a framework and generic constructions
- Extractable Perfectly One-Way Functions
- The magic of ELFs
- A shuffle argument secure in the generic model
- NIZKs with an untrusted CRS: security in the face of parameter subversion
- Lattice-based SNARGs and their application to more efficient obfuscation
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- On the (in)security of SNARKs in the presence of oracles
- A note on perfect correctness by derandomization
- Non-interactive zero-knowledge from non-interactive batch arguments
- On subversion-resistant SNARKs
- Contention in cryptoland: obfuscation, leakage and UCE
- 3-message zero knowledge against human ignorance
- Absolute results concerning one-way functions and their applications
- The Magic of ELFs
- Weakly extractable one-way functions
- Magic adversaries versus individual reduction: science wins either way
- Constant-size zk-SNARKs in ROM from falsifiable assumptions
- Witness semantic security
- Compressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmics
- A note on perfect correctness by derandomization
- Toward RSA-OAEP without random oracles
- Explicit two-source extractors and resilient functions
- Weak Zero-Knowledge beyond the Black-Box Barrier
- On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
- Limits of extractability assumptions with distributional auxiliary input
- Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation
- The hunting of the SNARK
- On constant-round concurrent zero-knowledge from a knowledge assumption
- On the existence of extractable one-way functions
- On instantiating the algebraic group model from falsifiable assumptions
- Public-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hash
- To label, or not to label (in generic groups)
Uses Software
This page was built for publication: On the existence of extractable one-way functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5259586)