Showing 1 - 20 results of 31 for search '"indistinguishability obfuscation"', query time: 0.12s Refine Results
  1. 1

    Indistinguishability Obfuscation: From Approximate to Exact by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2017
    “…We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2+ϵ fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Indistinguishability Obfuscation from Functional Encryption by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2018
    “…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Indistinguishability Obfuscation from Functional Encryption by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings by Bitansky, Nir, Canetti, Ran, Garg, Sanjam, Holmgren, Justin, Jain, Abhishek, Lin, Huijia, Pass, Rafael, Telang, Sidharth, Vaikuntanathan, Vinod

    Published 2021
    “…We show how to construct indistinguishability obfuscation (\bfi/bfO) for RAM programs with bounded space, assuming/bfi/bfO for circuits and one-way functions, both with subexponential security. …”
    Get full text
    Article
  7. 7

    Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation by Lombardi, Alex, Vaikuntanathan, Vinod

    Published 2021
    “…Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a non-standard assumption on “Goldreich-like” pseudorandom generators. …”
    Get full text
    Article
  8. 8

    Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation by Canetti, Ran, Goldwasser, Shafi, Poburinnaya, Oxana

    Published 2021
    “…It requires a global (nonprogrammable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. …”
    Get full text
    Book
  9. 9
  10. 10
  11. 11
  12. 12

    Obfuscation of Probabilistic Circuits and Applications by Ananth, Prabhanjan, Brakerski, Zvika, Segev, Gil, Vaikuntananthan, Vinod

    Published 2021
    “…We call the resulting notion probabilistic indistinguishability obfuscation (pIO). We define several variants of pIO, and study relations among them. …”
    Get full text
    Article
  13. 13
  14. 14

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2022
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  15. 15

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  16. 16
  17. 17

    Anonymous Homomorphic IBE with Application to Anonymous Aggregation by Michael Clear, Hitesh Tewari

    Published 2023-04-01
    “…Note that even when strong assumptions, such as indistinguishability obfuscation (iO), are permitted, no schemes are known. …”
    Get full text
    Article
  18. 18
  19. 19

    The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator by Bitansky, Nir, Canetti, Ran, Cohn, Henry, Goldwasser, Shafi, Kalai, Yael Tauman, Paneth, Omer, Rosen, Alon

    Published 2021
    “…In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat counterintuitively, strong impossibility results for virtual black box obfuscation. …”
    Get full text
    Article
  20. 20

    A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids by Yihui Dong, Jian Shen, Sai Ji, Rongxin Qi, Shuai Liu

    Published 2021-10-01
    “…Furthermore, indistinguishability obfuscation (IO) is utilised to keep the chameleon hash value secret and decrease the overhead of the trusted third party. …”
    Get full text
    Article