Efficiently obfuscating re-encryption program under DDH assumption
From MaRDI portal
Publication:6487206
DOI10.1007/978-3-319-61204-1_14zbMATH Open1522.94089MaRDI QIDQ6487206FDOQ6487206
Authors: Akshayaram Srinivasan, C. Pandu Rangan
Publication date: 1 July 2022
Recommendations
- Securely obfuscating re-encryption
- Securely Obfuscating Re-encryption
- Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- Functional Re-encryption and Collusion-Resistant Obfuscation
Cites Work
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption using ideal lattices
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Foundations of Cryptography
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Title not available (Why is that?)
- How to use indistinguishability obfuscation
- Efficient Unidirectional Proxy Re-Encryption
- Title not available (Why is that?)
- Functional Re-encryption and Collusion-Resistant Obfuscation
- Obfuscation of hyperplane membership
- Secure obfuscation for encrypted signatures
- On obfuscating point functions
- Obfuscating Point Functions with Multibit Output
- Title not available (Why is that?)
- Securely Obfuscating Re-encryption
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
- Breaking the sub-exponential barrier in obfustopia
- Two-round secure MPC from indistinguishability obfuscation
- Lattice-based FHE as secure as PKE
- Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
Cited In (4)
- Securely Obfuscating Re-encryption
- Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
- Securely obfuscating re-encryption
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
This page was built for publication: Efficiently obfuscating re-encryption program under DDH assumption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6487206)