-
1
Indistinguishability Obfuscation: From Approximate to Exact
Published 2017“…We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2+ϵ fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. …”
Get full text
Get full text
Get full text
Article -
2
Indistinguishability Obfuscation from Functional Encryption
Published 2018“…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
Get full text
Get full text
Get full text
Article -
3
Indistinguishability Obfuscation from Functional Encryption
Published 2021“…© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
Get full text
Article -
4
Low complexity pseudorandom generators and indistinguishability obfuscation
Published 2018Get full text
Thesis -
5
Indistinguishability Obfuscation, Range Avoidance, and Bounded Arithmetic
Published 2023Get full text
Article -
6
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
Published 2021“…We show how to construct indistinguishability obfuscation (\bfi/bfO) for RAM programs with bounded space, assuming/bfi/bfO for circuits and one-way functions, both with subexponential security. …”
Get full text
Article -
7
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Published 2021“…Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a non-standard assumption on “Goldreich-like” pseudorandom generators. …”
Get full text
Article -
8
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
Published 2021“…It requires a global (nonprogrammable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. …”
Get full text
Book -
9
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
Published 2017Subjects: “…Indistinguishability Obfuscation…”
Get full text
-
10
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
Published 2018-05-01Subjects: “…indistinguishability obfuscation…”
Get full text
Article -
11
Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation
Published 2022-01-01Subjects: Get full text
Article -
12
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards
Published 2018-01-01Subjects: Get full text
Article -
13
CCA1 secure FHE from PIO, revisited
Published 2018-09-01Subjects: “…Probabilistic indistinguishability obfuscation…”
Get full text
Article -
14
Self-Bilinear Map from One Way Encoding System and <i>i𝒪</i>
Published 2024-01-01Subjects: Get full text
Article -
15
Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern
Published 2018-01-01Subjects: Get full text
Article -
16
Obfuscation of Probabilistic Circuits and Applications
Published 2021“…We call the resulting notion probabilistic indistinguishability obfuscation (pIO). We define several variants of pIO, and study relations among them. …”
Get full text
Article -
17
-
18
A Note on Perfect Correctness by Derandomization
Published 2022“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
19
A Note on Perfect Correctness by Derandomization
Published 2021“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
20
Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process
Published 2018-11-01“…In Mid-DRRQ mechanism, the protocol-level attacks are prevented by using indistinguishability obfuscation model which generates the fake traffic within the middle relay. …”
Get full text
Article