Indistinguishability Obfuscation with Non-trivial Efficiency
暂无分享,去创建一个
Rafael Pass | Karn Seth | Sidharth Telang | Huijia Lin | R. Pass | Karn Seth | Huijia Lin | Sidharth Telang
[1] Ran Canetti,et al. Indistinguishability Obfuscation of Iterated Circuits and RAM Programs , 2014, IACR Cryptol. ePrint Arch..
[2] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[3] Jean-Sébastien Coron,et al. Practical Multilinear Maps over the Integers , 2013, CRYPTO.
[4] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[5] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[6] Abhi Shelat,et al. Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings , 2016, TCC.
[7] Allison Bishop,et al. Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[8] Brent Waters,et al. Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.
[9] Allison Bishop,et al. Witness Encryption from Instance Independent Assumptions , 2014, IACR Cryptol. ePrint Arch..
[10] Vinod Vaikuntanathan,et al. The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically , 2014, IACR Cryptol. ePrint Arch..
[11] Allison Bishop,et al. Indistinguishability Obfuscation for Turing Machines with Unbounded Memory , 2015, IACR Cryptol. ePrint Arch..
[12] Ran Canetti,et al. Obfuscation of Probabilistic Circuits and Applications , 2015, TCC.
[13] Rafael Pass,et al. Output-Compressing Randomized Encodings and Applications , 2016, TCC.
[14] ApplebaumBenny,et al. Cryptography in $NC^0$ , 2006 .
[15] Nir Bitansky,et al. Succinct Randomized Encodings and their Applications , 2015, IACR Cryptol. ePrint Arch..
[16] Craig Gentry,et al. Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[17] Jung Hee Cheon,et al. Cryptanalysis of the Multilinear Map over the Integers , 2014, EUROCRYPT.
[18] Craig Gentry,et al. Two-Round Secure MPC from Indistinguishability Obfuscation , 2014, TCC.
[19] Yuval Ishai,et al. Cryptography in NC0 , 2004, SIAM J. Comput..
[20] B. Applebaum. Cryptography in NC0 , 2014 .
[21] Kai-Min Chung,et al. On Extractability Obfuscation , 2014, IACR Cryptol. ePrint Arch..
[22] Aggelos Kiayias,et al. Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..
[23] Craig Gentry,et al. Graph-Induced Multilinear Maps from Lattices , 2015, TCC.
[24] Mohammad Mahmoody,et al. More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models , 2015, IACR Cryptol. ePrint Arch..
[25] Brice Minaud,et al. Cryptanalysis of the New Multilinear Map over the Integers , 2015, IACR Cryptol. ePrint Arch..
[26] Adam O'Neill,et al. Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..
[27] Brice Minaud,et al. Cryptanalysis of the New CLT Multilinear Map over the Integers , 2016, EUROCRYPT.
[28] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[29] Yael Tauman Kalai,et al. Protecting Obfuscation against Algebraic Attacks , 2014, EUROCRYPT.
[30] Yael Tauman Kalai,et al. On Obfuscation with Random Oracles , 2015, TCC.
[31] Jean-Sébastien Coron,et al. New Multilinear Maps Over the Integers , 2015, CRYPTO.
[32] Mohammad Mahmoody,et al. On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models , 2016, TCC.
[33] Yael Tauman Kalai,et al. On the impossibility of obfuscation with auxiliary input , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[34] Brent Waters,et al. Functional encryption: a new vision for public-key cryptography , 2012, CACM.
[35] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[36] Rafael Pass,et al. Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings , 2014, CRYPTO.
[37] Yuval Ishai,et al. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.
[38] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[39] Yuval Ishai,et al. Cryptography in NC0 , 2004, FOCS.
[40] Moni Naor,et al. On Cryptographic Assumptions and Challenges , 2003, CRYPTO.
[41] Abhishek Jain,et al. Indistinguishability Obfuscation from Compact Functional Encryption , 2015, CRYPTO.
[42] Mark Zhandry,et al. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation , 2014, Algorithmica.
[43] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.
[44] Nir Bitansky,et al. Indistinguishability Obfuscation from Functional Encryption , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.