Lockable obfuscation from circularly insecure fully homomorphic encryption
From MaRDI portal
Publication:6169028
DOI10.1007/978-3-030-97131-1_3zbMATH Open1519.94146OpenAlexW3204248498MaRDI QIDQ6169028FDOQ6169028
Publication date: 10 August 2023
Published in: Public-Key Cryptography – PKC 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-97131-1_3
Recommendations
- Obfuscation \(\Rightarrow\) (IND-CPA security \(\nRightarrow\) circular security)
- On perfect correctness in (lockable) obfuscation
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
- Candidate indistinguishability obfuscation and functional encryption for all circuits
Cites Work
- Title not available (Why is that?)
- On Ideal Lattices and Learning with Errors over Rings
- Fully homomorphic encryption using ideal lattices
- On lattices, learning with errors, random linear codes, and cryptography
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Pseudorandom Generator from any One-way Function
- Public-Key Encryption Schemes with Auxiliary Inputs
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- A Leakage-Resilient Mode of Operation
- On cryptography with auxiliary input
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-Key Encryption in the Bounded-Retrieval Model
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- On the (Im)Possibility of Key Dependent Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
- Title not available (Why is that?)
- Correcting errors without leaking partial information
- On Symmetric Encryption and Point Obfuscation
- Obfuscation of Hyperplane Membership
- On obfuscating point functions
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- On the (im)possibility of obfuscating programs
- Obfuscating Point Functions with Multibit Output
- Title not available (Why is that?)
- On the Circular Security of Bit-Encryption
- Another step towards realizing random oracles: non-malleable point obfuscation
- Point-Function Obfuscation: A Framework and Generic Constructions
- Cryptographic Agility and Its Relation to Circular Encryption
- A simple obfuscation scheme for pattern-matching with wildcards
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- On perfect correctness in (lockable) obfuscation
- New techniques for obfuscating conjunctions
- Obfuscating conjunctions under entropic ring LWE
- Obfuscating Conjunctions
- Graph-Induced Multilinear Maps from Lattices
- Upgrading to functional encryption
- Traitor-tracing from LWE made simple and attribute-based
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
- Indistinguishability Obfuscation with Non-trivial Efficiency
- Learning with Rounding, Revisited
- Collusion resistant traitor tracing from learning with errors
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
- The Magic of ELFs
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- Separations in Circular Security for Arbitrary Length Key Cycles
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
- Candidate iO from homomorphic encryption schemes
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- Candidate obfuscation via oblivious LWE sampling
- Sum-of-squares meets program obfuscation, revisited
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- Post-quantum zero knowledge in constant rounds
- Weak zero-knowledge beyond the black-box barrier
- New Definitions and Separations for Circular Security
- Secure quantum extraction protocols
- Obfuscating simple functionalities from knowledge assumptions
- New Circular Security Counterexamples from Decision Linear and Learning with Errors
- Circular Security Separations for Arbitrary Length Cycles from LWE
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
- Lockable obfuscation from circularly insecure fully homomorphic encryption
Cited In (2)
This page was built for publication: Lockable obfuscation from circularly insecure fully homomorphic encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6169028)