Pages that link to "Item:Q2304923"
From MaRDI portal
The following pages link to Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification (Q2304923):
Displayed 35 items.
- Candidate iO from homomorphic encryption schemes (Q2055602) (← links)
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE (Q2055603) (← links)
- Combiners for functional encryption, unconditionally (Q2055605) (← links)
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments (Q2056787) (← links)
- Amplifying the security of functional encryption, unconditionally (Q2096505) (← links)
- Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs (Q2104234) (← links)
- Counterexamples to new circular security assumptions underlying iO (Q2128580) (← links)
- Multi-input quadratic functional encryption from pairings (Q2139634) (← links)
- Functional encryption for Turing machines with dynamic bounded collusion from LWE (Q2139636) (← links)
- Constructions for quantum indistinguishability obfuscation (Q2146070) (← links)
- Attribute-based access control for inner product functional encryption from LWE (Q2146083) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\) (Q2170025) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Succinct LWE sampling, random polynomials, and obfuscation (Q2697860) (← links)
- Short attribute-based signatures for arbitrary Turing machines from standard assumptions (Q2701493) (← links)
- One-Way Functions and (Im)perfect Obfuscation (Q5885583) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- On the optimal succinctness and efficiency of functional encryption and attribute-based encryption (Q6063529) (← links)
- Unbounded quadratic functional encryption and more from pairings (Q6063532) (← links)
- Structure-preserving compilers from new notions of obfuscations (Q6067384) (← links)
- On the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generator (Q6095188) (← links)
- Identity-based encryption in DDH hard groups (Q6103077) (← links)
- Candidate iO from homomorphic encryption schemes (Q6109075) (← links)
- Functional encryption with secure key leasing (Q6134000) (← links)
- Witness encryption and null-iO from evasive LWE (Q6135397) (← links)
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \) (Q6138084) (← links)
- Candidate witness encryption from lattice techniques (Q6155267) (← links)
- Multi-input attribute based encryption and predicate encryption (Q6155270) (← links)
- Lockable obfuscation from circularly insecure fully homomorphic encryption (Q6169028) (← links)
- Streaming functional encryption (Q6190119) (← links)
- Indistinguishability obfuscation (Q6198645) (← links)