Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation

From MaRDI portal
Publication:5418697

DOI10.1007/978-3-642-55220-5_12zbMath1332.94068OpenAlexW1558353365MaRDI QIDQ5418697

Brent Waters, Amit Sahai, Susan Hohenberger

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_12




Related Items (28)

Practical algorithm substitution attack on extractable signaturesThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOToward RSA-OAEP Without Random OraclesThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksFiat-Shamir for highly sound protocols is instantiableLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionStrong Hardness of Privacy from Weak Traitor TracingSurvey of information securitySimpler constructions of asymmetric primitives from obfuscationOn constructing one-way permutations from indistinguishability obfuscationThe random oracle model: a twenty-year retrospectiveMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsAugmented random oraclesInstantiability of classical random-oracle-model encryption transformsRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsAccumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationObfustopia built on secret-key functional encryptionOn Constructing One-Way Permutations from Indistinguishability ObfuscationConstrained pseudorandom functions from functional encryptionFiat–Shamir for Highly Sound Protocols Is InstantiableThe magic of ELFsThe Magic of ELFsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationOn instantiating the algebraic group model from falsifiable assumptions




This page was built for publication: Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation