Obfuscation for Evasive Functions
From MaRDI portal
Publication:5746331
DOI10.1007/978-3-642-54242-8_2zbMATH Open1296.94077OpenAlexW184028394MaRDI QIDQ5746331FDOQ5746331
Yael Tauman Kalai, Omer Paneth, Amit Sahai, Ran Canetti, Boaz Barak, Nir Bitansky
Publication date: 18 February 2014
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-54242-8_2
Cited In (23)
- Structure-preserving compilers from new notions of obfuscations
- Obfuscating finite automata
- Impossibility of efficient information-theoretic fuzzy extraction
- Signature for objects: formalizing how to authenticate physical data and more
- Computational wiretap coding from indistinguishability obfuscation
- The pseudorandom oracle model and ideal obfuscation
- Obfuscating simple functionalities from knowledge assumptions
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems
- Additive randomized encodings and their applications
- Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation
- Obfuscating evasive decision trees
- Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond
- On the Correlation Intractability of Obfuscated Pseudorandom Functions
- Secure software leasing
- R3PO: reach-restricted reactive program obfuscation and its applications
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- Small Superset and Big Subset Obfuscation
- On virtual grey box obfuscation for general circuits
- Shorter Circuit Obfuscation in Challenging Security Models
- Obfuscating conjunctions
- Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation
- Upgrading fuzzy extractors
This page was built for publication: Obfuscation for Evasive Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5746331)