Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307244

DOI10.1007/b97182zbMath1122.94434OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307244

Amit Sahai, Manoj Prabhakaran, Benjamin Yin-Sun Lynn

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (32)

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOObfuscating finite automataLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionBad Directions in Cryptographic Hash FunctionsUnclonable polymers and their cryptographic applicationsObfuscated fuzzy Hamming distance and conjunctions from subset product problemsPublic-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applicationsStructure-preserving compilers from new notions of obfuscationsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationHow to obfuscate MPC inputsLockable obfuscation from circularly insecure fully homomorphic encryptionNonmalleable digital lockers and robust fuzzy extractors in the plain modelOn the obfuscatability of quantum point functionsVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESObfuscating conjunctionsObfuscation for cryptographic purposesReusable fuzzy extractors for low-entropy distributionsImpossibility of VBB Obfuscation with Ideal Constant-Degree Graded EncodingsOn the Impossibility of Virtual Black-Box Obfuscation in Idealized ModelsPoint-Function Obfuscation: A Framework and Generic ConstructionsOn best-possible obfuscationOn strong simulation and composable point obfuscationCounting distance permutationsSecure Obfuscation of Encrypted Verifiable Encrypted SignaturesSignatures Resilient to Uninvertible LeakageTowards Security Notions for White-Box CryptographyOn Symmetric Encryption and Point ObfuscationObfuscation of Hyperplane MembershipA decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationIND-secure quantum symmetric encryption based on point obfuscationInstantiation of quantum point obfuscationAd Hoc PSM Protocols: Secure Computation Without Coordination




This page was built for publication: Advances in Cryptology - EUROCRYPT 2004