600.641 Special Topics in Theoretical Cryptography Lecture 18: Program Obfuscation
暂无分享,去创建一个
[1] Susan Hohenberger,et al. Advances in signatures, encryption, and E-Cash from bilinear groups , 2006 .
[2] Amit Sahai,et al. Positive Results and Techniques for Obfuscation , 2004, EUROCRYPT.
[3] Satoshi Hada,et al. Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.
[4] Ran Canetti,et al. Perfectly One-Way Probabilistic Hash Functions , 1998, Symposium on the Theory of Computing.
[5] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[6] Dennis Hofheinz,et al. Obfuscation for Cryptographic Purposes , 2007, TCC.
[7] Yael Tauman Kalai,et al. On the impossibility of obfuscation with auxiliary input , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[8] Ran Canetti,et al. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.
[9] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[10] Hoeteck Wee,et al. On obfuscating point functions , 2005, STOC '05.
[11] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[12] R. Lathe. Phd by thesis , 1988, Nature.
[13] Yevgeniy Dodis,et al. Correcting errors without leaking partial information , 2005, STOC '05.
[14] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.