Obfuscation of Probabilistic Circuits and Applications

From MaRDI portal
Publication:5261688

DOI10.1007/978-3-662-46497-7_19zbMath1382.94078OpenAlexW25973253MaRDI QIDQ5261688

Stefano Tessaro, Vinod Vaikuntanathan, Ran Canetti, Huijia Lin

Publication date: 6 July 2015

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_19




Related Items (51)

Impossibility of quantum virtual black-box obfuscation of classical circuitsThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOTopology-hiding computation beyond semi-honest adversariesFE and iO for Turing machines from minimal assumptionsWhite box traitor tracingLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionConstructions for quantum indistinguishability obfuscationDelegating RAM Computations with Adaptive Soundness and PrivacyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionLattice-based HRA-secure attribute-based proxy re-encryption in standard modelIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)COA-secure obfuscation and applicationsDistributed (correlation) samplers: how to remove a trusted dealer in one roundIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsOn the Bottleneck Complexity of MPC with Correlated RandomnessFrom cryptomania to obfustopia through secret-key functional encryptionFrom FE combiners to secure MPC and backLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesOn constructing one-way permutations from indistinguishability obfuscationMultilinear maps from obfuscationMulti-input Functional Encryption with Unbounded-Message SecurityThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsSublinear secure computation from new assumptionsHomomorphic encryption: a mathematical surveyPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)(Inner-product) functional encryption with updatable ciphertextsThe pseudorandom oracle model and ideal obfuscationMultikey Fully Homomorphic Encryption and ApplicationsSuccinct interactive oracle proofs: applications and limitationsAnonymous whistleblowing over authenticated channelsIndistinguishability obfuscationChosen-Ciphertext Secure Fully Homomorphic EncryptionSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessCollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsMultilinear Maps from ObfuscationPerfect Structure on the Edge of ChaosObfustopia built on secret-key functional encryptionOn Constructing One-Way Permutations from Indistinguishability ObfuscationIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FENon-interactive anonymous routerUniversal proxy re-encryptionUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionSpooky Encryption and Its ApplicationsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationA decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationGarbled Circuits as Randomized Encodings of Functions: a PrimerToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsOn instantiating the algebraic group model from falsifiable assumptions




This page was built for publication: Obfuscation of Probabilistic Circuits and Applications