Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
暂无分享,去创建一个
Ilan Komargodski | Zvika Brakerski | Daniel Wichs | Aayush Jain | Alain Passelègue | Zvika Brakerski | Daniel Wichs | Aayush Jain | Ilan Komargodski | Alain Passelègue
[1] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[2] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[3] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[4] Brent Waters,et al. Functional encryption: a new vision for public-key cryptography , 2012, CACM.
[5] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[6] Nir Bitansky,et al. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption , 2016, Journal of Cryptology.
[7] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[8] Brent Waters,et al. Lockable Obfuscation , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).
[9] Daniel Wichs,et al. Obfuscating Compute-and-Compare Programs under LWE , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).
[10] Rafael Pass,et al. Indistinguishability Obfuscation with Non-trivial Efficiency , 2016, Public Key Cryptography.
[11] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[12] Ilan Komargodski,et al. From Minicrypt to Obfustopia via Private-Key Functional Encryption , 2017, EUROCRYPT.
[13] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[14] Craig Gentry,et al. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits , 2014, EUROCRYPT.
[15] Vinod Vaikuntanathan,et al. Predicate Encryption for Circuits from LWE , 2015, CRYPTO.
[16] Vinod Vaikuntanathan,et al. Attribute-based encryption for circuits , 2013, STOC '13.
[17] Brent Waters,et al. Witness encryption and its applications , 2013, STOC '13.
[18] Moni Naor,et al. Secret-Sharing for NP , 2014, Journal of Cryptology.