On Extractability Obfuscation
From MaRDI portal
Publication:5746332
DOI10.1007/978-3-642-54242-8_3zbMath1317.94089OpenAlexW1485683924MaRDI QIDQ5746332
Kai-Min Chung, Elette Boyle, Rafael Pass
Publication date: 18 February 2014
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-54242-8_3
Cryptography (94A60) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17)
Related Items (61)
One-Way Functions and (Im)perfect Obfuscation ⋮ The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO ⋮ Upgrading to functional encryption ⋮ Fiat-Shamir for highly sound protocols is instantiable ⋮ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption ⋮ From Selective to Adaptive Security in Functional Encryption ⋮ A Punctured Programming Approach to Adaptively Secure Functional Encryption ⋮ Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation ⋮ Indistinguishability Obfuscation from Compact Functional Encryption ⋮ Delegating RAM Computations with Adaptive Soundness and Privacy ⋮ Adaptive Succinct Garbled RAM or: How to Delegate Your Database ⋮ Incompressible cryptography ⋮ Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings ⋮ Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions ⋮ On the power of rewinding simulators in functional encryption ⋮ From minicrypt to obfustopia via private-key functional encryption ⋮ Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications ⋮ Simulation-Based Secure Functional Encryption in the Random Oracle Model ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Unbounded quadratic functional encryption and more from pairings ⋮ Structure-preserving compilers from new notions of obfuscations ⋮ On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input ⋮ Multi-input Functional Encryption with Unbounded-Message Security ⋮ How to Generate and Use Universal Samplers ⋮ On the security of functional encryption in the generic group model ⋮ Identity-based encryption in DDH hard groups ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Security-preserving distributed samplers: how to generate any CRS in one round without random oracles ⋮ Tracing quantum state distinguishers via backtracking ⋮ Verifiable functional encryption using Intel SGX ⋮ Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Offline witness encryption with semi-adaptive security ⋮ Functional encryption for randomized functionalities in the private-key setting from minimal assumptions ⋮ Function-private functional encryption in the private-key setting ⋮ Strongly full-hiding inner product encryption ⋮ Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions ⋮ CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions ⋮ Fully Leakage-Resilient Codes ⋮ From Minicrypt to Obfustopia via Private-Key Functional Encryption ⋮ Output-Compressing Randomized Encodings and Applications ⋮ Functional Encryption for Turing Machines ⋮ Perfect Structure on the Edge of Chaos ⋮ How to build time-lock encryption ⋮ How to Avoid Obfuscation Using Witness PRFs ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries ⋮ Abuse resistant law enforcement access systems ⋮ Offline Witness Encryption ⋮ Constrained PRFs for Unbounded Inputs with Short Keys ⋮ Multi-client functional encryption for separable functions ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Bounded KDM Security from iO and OWF ⋮ A new approach to practical function-private inner product encryption ⋮ Leakage resilience from program obfuscation ⋮ The magic of ELFs ⋮ The Magic of ELFs ⋮ Unnamed Item ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
This page was built for publication: On Extractability Obfuscation