On Extractability Obfuscation

From MaRDI portal
Publication:5746332

DOI10.1007/978-3-642-54242-8_3zbMath1317.94089OpenAlexW1485683924MaRDI QIDQ5746332

Kai-Min Chung, Elette Boyle, Rafael Pass

Publication date: 18 February 2014

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-54242-8_3




Related Items (61)

One-Way Functions and (Im)perfect ObfuscationThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOUpgrading to functional encryptionFiat-Shamir for highly sound protocols is instantiableLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionFrom Selective to Adaptive Security in Functional EncryptionA Punctured Programming Approach to Adaptively Secure Functional EncryptionConstant-Round Concurrent Zero-Knowledge from Indistinguishability ObfuscationIndistinguishability Obfuscation from Compact Functional EncryptionDelegating RAM Computations with Adaptive Soundness and PrivacyAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseIncompressible cryptographyIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsOn the power of rewinding simulators in functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionPublic-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applicationsSimulation-Based Secure Functional Encryption in the Random Oracle ModelAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionBounded Collusion ABE for TMs from IBEUnbounded quadratic functional encryption and more from pairingsStructure-preserving compilers from new notions of obfuscationsOn the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary inputMulti-input Functional Encryption with Unbounded-Message SecurityHow to Generate and Use Universal SamplersOn the security of functional encryption in the generic group modelIdentity-based encryption in DDH hard groupsPublic-key watermarking schemes for pseudorandom functionsSecurity-preserving distributed samplers: how to generate any CRS in one round without random oraclesTracing quantum state distinguishers via backtrackingVerifiable functional encryption using Intel SGXLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationKDM security for identity-based encryption: constructions and separationsOffline witness encryption with semi-adaptive securityFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsFunction-private functional encryption in the private-key settingStrongly full-hiding inner product encryptionMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsFully Leakage-Resilient CodesFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionOutput-Compressing Randomized Encodings and ApplicationsFunctional Encryption for Turing MachinesPerfect Structure on the Edge of ChaosHow to build time-lock encryptionHow to Avoid Obfuscation Using Witness PRFsContention in Cryptoland: Obfuscation, Leakage and UCEPoint-Function Obfuscation: A Framework and Generic ConstructionsNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesAbuse resistant law enforcement access systemsOffline Witness EncryptionConstrained PRFs for Unbounded Inputs with Short KeysMulti-client functional encryption for separable functionsSignatures Resilient to Uninvertible LeakageBounded KDM Security from iO and OWFA new approach to practical function-private inner product encryptionLeakage resilience from program obfuscationThe magic of ELFsThe Magic of ELFsUnnamed ItemPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software




This page was built for publication: On Extractability Obfuscation