Obfuscating simple functionalities from knowledge assumptions
暂无分享,去创建一个
[1] Nir Bitansky,et al. On Strong Simulation and Composable Point Obfuscation , 2010, CRYPTO.
[2] Mark Zhandry,et al. New Techniques for Obfuscating Conjunctions , 2019, IACR Cryptol. ePrint Arch..
[3] Allison Bishop,et al. A Simple Obfuscation Scheme for Pattern-Matching with Wildcards , 2018, IACR Cryptol. ePrint Arch..
[4] Amit Sahai,et al. Positive Results and Techniques for Obfuscation , 2004, EUROCRYPT.
[5] Vinod Vaikuntanathan,et al. Obfuscating Conjunctions under Entropic Ring LWE , 2016, ITCS.
[6] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[7] Ran Canetti,et al. Obfuscating Point Functions with Multibit Output , 2008, EUROCRYPT.
[8] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[9] Ran Canetti,et al. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.
[10] Ran Canetti,et al. Obfuscation of Hyperplane Membership , 2010, TCC.
[11] Eike Kiltz,et al. The Algebraic Group Model and its Applications , 2018, IACR Cryptol. ePrint Arch..
[12] Satoshi Hada,et al. Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.
[13] Daniel Wichs,et al. Obfuscating Compute-and-Compare Programs under LWE , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).
[14] Hoeteck Wee,et al. On obfuscating point functions , 2005, STOC '05.
[15] Guy N. Rothblum,et al. Obfuscating Conjunctions , 2015, Journal of Cryptology.
[16] Brent Waters,et al. Lockable Obfuscation , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).