-
1
Indistinguishability Obfuscation: From Approximate to Exact
Published 2017“…We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2+ϵ fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. …”
Get full text
Get full text
Get full text
Article -
2
Indistinguishability Obfuscation from Functional Encryption
Published 2018“…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
Get full text
Get full text
Get full text
Article -
3
Indistinguishability Obfuscation from Functional Encryption
Published 2021“…© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
Get full text
Article -
4
Low complexity pseudorandom generators and indistinguishability obfuscation
Published 2018Get full text
Thesis -
5
Indistinguishability Obfuscation, Range Avoidance, and Bounded Arithmetic
Published 2023Get full text
Article -
6
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
Published 2021“…We show how to construct indistinguishability obfuscation (\bfi/bfO) for RAM programs with bounded space, assuming/bfi/bfO for circuits and one-way functions, both with subexponential security. …”
Get full text
Article -
7
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Published 2021“…Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a non-standard assumption on “Goldreich-like” pseudorandom generators. …”
Get full text
Article -
8
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
Published 2021“…It requires a global (nonprogrammable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. …”
Get full text
Book -
9
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
Published 2017Subjects: “…Indistinguishability Obfuscation…”
Get full text
-
10
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
Published 2018-05-01Subjects: “…indistinguishability obfuscation…”
Get full text
Article -
11
Self-Bilinear Map from One Way Encoding System and <i>i𝒪</i>
Published 2024-01-01Subjects: Get full text
Article -
12
Obfuscation of Probabilistic Circuits and Applications
Published 2021“…We call the resulting notion probabilistic indistinguishability obfuscation (pIO). We define several variants of pIO, and study relations among them. …”
Get full text
Article -
13
-
14
A Note on Perfect Correctness by Derandomization
Published 2022“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
15
A Note on Perfect Correctness by Derandomization
Published 2021“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
16
-
17
Anonymous Homomorphic IBE with Application to Anonymous Aggregation
Published 2023-04-01“…Note that even when strong assumptions, such as indistinguishability obfuscation (iO), are permitted, no schemes are known. …”
Get full text
Article -
18
-
19
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
Published 2021“…In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat counterintuitively, strong impossibility results for virtual black box obfuscation. …”
Get full text
Article -
20
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids
Published 2021-10-01“…Furthermore, indistinguishability obfuscation (IO) is utilised to keep the chameleon hash value secret and decrease the overhead of the trusted third party. …”
Get full text
Article