Obfuscating Point Functions with Multibit Output
From MaRDI portal
Publication:5458610
DOI10.1007/978-3-540-78967-3_28zbMATH Open1149.94306OpenAlexW1489922337MaRDI QIDQ5458610FDOQ5458610
Authors: Ran Canetti, Ronny Ramzi Dakdouk
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_28
Recommendations
obfuscationpoint function obfuscationcomposable obfuscationdigital lockermultibit point function obfuscation
Cited In (33)
- Instantiation of quantum point obfuscation
- On symmetric encryption and point obfuscation
- Obfuscation of hyperplane membership
- Obfuscation from low noise multilinear maps
- Impossibility of quantum virtual black-box obfuscation of classical circuits
- Point-function obfuscation: a framework and generic constructions
- Obfuscation for cryptographic purposes
- Chosen ciphertext security via point obfuscation
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- Beyond Uber: instantiating generic groups via PGGs
- Secure Obfuscation of Encrypted Verifiable Encrypted Signatures
- A secure symmetric encryption scheme based on an obfuscator
- Obfuscation for Cryptographic Purposes
- Instantiability of classical random-oracle-model encryption transforms
- On strong simulation and composable point obfuscation
- Leakage resilient one-way functions: the auxiliary-input setting
- Towards Security Notions for White-Box Cryptography
- Reusable fuzzy extractors for low-entropy distributions
- Unclonable polymers and their cryptographic applications
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries
- Cryptographic password obfuscation
- Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- On virtual grey box obfuscation for general circuits
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- Efficiently obfuscating re-encryption program under DDH assumption
- How to obfuscate MPC inputs
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- On the obfuscatability of quantum point functions
- Obfuscating conjunctions
- X-lock: a secure XOR-based fuzzy extractor for resource constrained devices
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
This page was built for publication: Obfuscating Point Functions with Multibit Output
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458610)