Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307244
DOI10.1007/b97182zbMath1122.94434OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307244
Amit Sahai, Manoj Prabhakaran, Benjamin Yin-Sun Lynn
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (32)
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO ⋮ Obfuscating finite automata ⋮ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption ⋮ Bad Directions in Cryptographic Hash Functions ⋮ Unclonable polymers and their cryptographic applications ⋮ Obfuscated fuzzy Hamming distance and conjunctions from subset product problems ⋮ Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications ⋮ Structure-preserving compilers from new notions of obfuscations ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ How to obfuscate MPC inputs ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Nonmalleable digital lockers and robust fuzzy extractors in the plain model ⋮ On the obfuscatability of quantum point functions ⋮ Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES ⋮ Obfuscating conjunctions ⋮ Obfuscation for cryptographic purposes ⋮ Reusable fuzzy extractors for low-entropy distributions ⋮ Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings ⋮ On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ On best-possible obfuscation ⋮ On strong simulation and composable point obfuscation ⋮ Counting distance permutations ⋮ Secure Obfuscation of Encrypted Verifiable Encrypted Signatures ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Towards Security Notions for White-Box Cryptography ⋮ On Symmetric Encryption and Point Obfuscation ⋮ Obfuscation of Hyperplane Membership ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation ⋮ IND-secure quantum symmetric encryption based on point obfuscation ⋮ Instantiation of quantum point obfuscation ⋮ Ad Hoc PSM Protocols: Secure Computation Without Coordination
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004