Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
暂无分享,去创建一个
Nir Bitansky | Ran Canetti | Vinod Vaikuntanathan | Sanjam Garg | Rafael Pass | Sidharth Telang | Huijia Lin | Abhishek Jain | Justin Holmgren | R. Pass | R. Canetti | V. Vaikuntanathan | Nir Bitansky | Abhishek Jain | Sanjam Garg | Justin Holmgren | Huijia Lin | Sidharth Telang
[1] Yuval Ishai,et al. Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[2] Silvio Micali,et al. Computationally Sound Proofs , 2000, SIAM J. Comput..
[3] Benny Applebaum,et al. Key-Dependent Message Security: Generic Amplification and Completeness , 2011, Journal of Cryptology.
[4] Daniel Wichs,et al. On the Communication Complexity of Secure Function Evaluation with Long Output , 2015, IACR Cryptol. ePrint Arch..
[5] Nir Bitansky,et al. The Hunting of the SNARK , 2016, Journal of Cryptology.
[6] Ran Canetti,et al. Fully Succinct Garbled RAM , 2016, ITCS.