Efficiently obfuscating re-encryption program under DDH assumption
From MaRDI portal
Publication:6487206
Recommendations
- Securely obfuscating re-encryption
- Securely Obfuscating Re-encryption
- Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- Functional Re-encryption and Collusion-Resistant Obfuscation
Cites work
- scientific article; zbMATH DE number 1583797 (Why is no real title available?)
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- Breaking the sub-exponential barrier in obfustopia
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Efficient Unidirectional Proxy Re-Encryption
- Foundations of Cryptography
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption using ideal lattices
- Functional Re-encryption and Collusion-Resistant Obfuscation
- How to use indistinguishability obfuscation
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Lattice-based FHE as secure as PKE
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Obfuscating Point Functions with Multibit Output
- Obfuscation of hyperplane membership
- On obfuscating point functions
- Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
- Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
- Secure obfuscation for encrypted signatures
- Securely Obfuscating Re-encryption
- Two-round secure MPC from indistinguishability obfuscation
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(4)- Securely Obfuscating Re-encryption
- Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
- Securely obfuscating re-encryption
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
This page was built for publication: Efficiently obfuscating re-encryption program under DDH assumption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6487206)