Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding

From MaRDI portal
Publication:5746330

DOI10.1007/978-3-642-54242-8_1zbMath1310.94134OpenAlexW2166561215MaRDI QIDQ5746330

Zvika Brakerski, Guy N. Rothblum

Publication date: 18 February 2014

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-54242-8_1




Related Items (58)

One-Way Functions and (Im)perfect ObfuscationObfuscating finite automataCutting-edge cryptography through the lens of secret sharingImpossibility of order-revealing encryption in idealized modelsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksPrivate Functional Encryption: Indistinguishability-Based Definitions and Constructions from ObfuscationZeroizing Without Low-Level Zeroes: New MMAP Attacks and their LimitationsDelegating RAM Computations with Adaptive Soundness and PrivacySecure Obfuscation in a Weak Multilinear Map ModelCompactness vs Collusion Resistance in Functional EncryptionSecret-sharing for NPCryptanalysis of candidate obfuscators for affine determinant programsProofs of Work from worst-case assumptionsPublic-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applicationsOn constructing one-way permutations from indistinguishability obfuscationMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsStructure-preserving compilers from new notions of obfuscationsOn virtual grey box obfuscation for general circuitsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsOn the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary inputHow to obfuscate MPC inputsPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Indistinguishability obfuscationObfuscating conjunctionsEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsWhite-box cryptography: don't forget about grey-box attacksCandidate iO from homomorphic encryption schemesImpossibility of VBB Obfuscation with Ideal Constant-Degree Graded EncodingsOn the Impossibility of Virtual Black-Box Obfuscation in Idealized ModelsLower Bounds on Assumptions Behind Indistinguishability ObfuscationIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsPerfect Structure on the Edge of ChaosCryptographic Assumptions: A Position PaperHow to build time-lock encryptionObfustopia built on secret-key functional encryptionHow to Avoid Obfuscation Using Witness PRFsCutting-Edge Cryptography Through the Lens of Secret SharingFunctional Encryption Without ObfuscationOn Constructing One-Way Permutations from Indistinguishability ObfuscationContention in Cryptoland: Obfuscation, Leakage and UCEObfuscating circuits via composite-order graded encodingConstrained pseudorandom functions from functional encryptionNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesCandidate iO from homomorphic encryption schemesIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationShorter Circuit Obfuscation in Challenging Security ModelsA Unified Approach to Idealized Model Separations via Indistinguishability ObfuscationObfuscation CombinersRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program Obfuscators




This page was built for publication: Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding