Showing 1 - 20 results of 40 for search '"indistinguishability obfuscation"', query time: 0.50s Refine Results
  1. 1

    Indistinguishability Obfuscation: From Approximate to Exact by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2017
    “…We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2+ϵ fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Indistinguishability Obfuscation from Functional Encryption by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2018
    “…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Indistinguishability Obfuscation from Functional Encryption by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings by Bitansky, Nir, Canetti, Ran, Garg, Sanjam, Holmgren, Justin, Jain, Abhishek, Lin, Huijia, Pass, Rafael, Telang, Sidharth, Vaikuntanathan, Vinod

    Published 2021
    “…We show how to construct indistinguishability obfuscation (\bfi/bfO) for RAM programs with bounded space, assuming/bfi/bfO for circuits and one-way functions, both with subexponential security. …”
    Get full text
    Article
  7. 7

    Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation by Lombardi, Alex, Vaikuntanathan, Vinod

    Published 2021
    “…Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a non-standard assumption on “Goldreich-like” pseudorandom generators. …”
    Get full text
    Article
  8. 8

    Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation by Canetti, Ran, Goldwasser, Shafi, Poburinnaya, Oxana

    Published 2021
    “…It requires a global (nonprogrammable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. …”
    Get full text
    Book
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    CCA1 secure FHE from PIO, revisited by Biao Wang, Xueqing Wang, Rui Xue

    Published 2018-09-01
    Subjects: “…Probabilistic indistinguishability obfuscation…”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Obfuscation of Probabilistic Circuits and Applications by Ananth, Prabhanjan, Brakerski, Zvika, Segev, Gil, Vaikuntananthan, Vinod

    Published 2021
    “…We call the resulting notion probabilistic indistinguishability obfuscation (pIO). We define several variants of pIO, and study relations among them. …”
    Get full text
    Article
  17. 17
  18. 18

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2022
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  19. 19

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  20. 20

    Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process by K. Sangeetha, K. Ravikumar

    Published 2018-11-01
    “…In Mid-DRRQ mechanism, the protocol-level attacks are prevented by using indistinguishability obfuscation model which generates the fake traffic within the middle relay. …”
    Get full text
    Article