Replacing a random oracle: full domain hash from indistinguishability obfuscation
From MaRDI portal
Publication:5418697
Recommendations
- Random-oracle uninstantiability from indistinguishability obfuscation
- On the Generic Insecurity of the Full Domain Hash
- scientific article; zbMATH DE number 1088253
- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
- Instantiability of classical random-oracle-model encryption transforms
Cited in
(35)- The magic of ELFs
- Fiat-Shamir for highly sound protocols is instantiable
- Limits on the power of indistinguishability obfuscation and functional encryption
- The pseudorandom oracle model and ideal obfuscation
- Fiat-Shamir for highly sound protocols is instantiable
- Toward RSA-OAEP without random oracles
- The Magic of ELFs
- Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps
- The random oracle model: a twenty-year retrospective
- On instantiating the algebraic group model from falsifiable assumptions
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- On constructing one-way permutations from indistinguishability obfuscation
- Augmented random oracles
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Strong hardness of privacy from weak traitor tracing
- Cocks’ Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
- Practical algorithm substitution attack on extractable signatures
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Simpler constructions of asymmetric primitives from obfuscation
- On constructing one-way permutations from indistinguishability obfuscation
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Survey of information security
- Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)
- On the correlation intractability of obfuscated pseudorandom functions
- Random-oracle uninstantiability from indistinguishability obfuscation
- Another step towards realizing random oracles: non-malleable point obfuscation
- On the Generic Insecurity of the Full Domain Hash
- scientific article; zbMATH DE number 1759781 (Why is no real title available?)
- Instantiability of classical random-oracle-model encryption transforms
- Obfustopia built on secret-key functional encryption
- Robust transforming combiners from indistinguishability obfuscation to functional encryption
- Constrained pseudorandom functions from functional encryption
This page was built for publication: Replacing a random oracle: full domain hash from indistinguishability obfuscation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5418697)