Pages that link to "Item:Q2292646"
From MaRDI portal
The following pages link to How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) (Q2292646):
Displaying 24 items.
- Candidate iO from homomorphic encryption schemes (Q2055602) (← links)
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE (Q2055603) (← links)
- Impossibility results for lattice-based functional encryption schemes (Q2055607) (← links)
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments (Q2056787) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Amplifying the security of functional encryption, unconditionally (Q2096505) (← links)
- Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs (Q2104234) (← links)
- Counterexamples to new circular security assumptions underlying iO (Q2128580) (← links)
- Functional encryption for Turing machines with dynamic bounded collusion from LWE (Q2139636) (← links)
- Attribute-based access control for inner product functional encryption from LWE (Q2146083) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\) (Q2170025) (← links)
- Inner-product functional encryption with fine-grained access control (Q2691594) (← links)
- Succinct LWE sampling, random polynomials, and obfuscation (Q2697860) (← links)
- NIKE from affine determinant programs (Q2697912) (← links)
- Short attribute-based signatures for arbitrary Turing machines from standard assumptions (Q2701493) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- On the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generator (Q6095188) (← links)
- Candidate iO from homomorphic encryption schemes (Q6109075) (← links)
- (Inner-product) functional encryption with updatable ciphertexts (Q6141858) (← links)
- Indistinguishability obfuscation (Q6198645) (← links)