Results 1  10
of
3,733
There is no Indistinguishability Obfuscation in Pessiland
, 2013
"... We show that if NP � co−RP then the existence of efficient indistinguishability obfuscation (iO) implies the existence of oneway functions. Thus, if we live in “Pessiland”, where NP problems are hard on the average but oneway functions do not exist, or even in “Heuristica”, where NP problems are h ..."
Abstract

Cited by 7 (1 self)
 Add to MetaCart
We show that if NP � co−RP then the existence of efficient indistinguishability obfuscation (iO) implies the existence of oneway functions. Thus, if we live in “Pessiland”, where NP problems are hard on the average but oneway functions do not exist, or even in “Heuristica”, where NP problems
Candidate indistinguishability obfuscation and functional encryption for all circuits
 In FOCS
, 2013
"... In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C0 and C1 of similar size, the obfuscations of C0 and C1 should be computationally indistinguishable. In functional ..."
Abstract

Cited by 169 (37 self)
 Add to MetaCart
In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C0 and C1 of similar size, the obfuscations of C0 and C1 should be computationally indistinguishable
Using Indistinguishability Obfuscation via UCEs
"... Abstract. We provide the first standard model construction for a powerful class of Universal Computational Extractors (UCEs; Bellare et al. Crypto 2013) based on indistinguishability obfuscation. Our construction suffices to instantiate correlationsecure hash functions and universal oneway functio ..."
Abstract

Cited by 4 (0 self)
 Add to MetaCart
Abstract. We provide the first standard model construction for a powerful class of Universal Computational Extractors (UCEs; Bellare et al. Crypto 2013) based on indistinguishability obfuscation. Our construction suffices to instantiate correlationsecure hash functions and universal one
Indistinguishability Obfuscation: from Approximate to Exact∗
"... We show general transformations from subexponentiallysecure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 + fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfu ..."
Abstract
 Add to MetaCart
We show general transformations from subexponentiallysecure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 + fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where
Indistinguishability Obfuscation with Constant Size Overhead
, 2015
"... Present constructions of indistinguishability obfuscation (iO) create obfuscated programs where the size of the obfuscated program is at least a factor of a security parameter larger than the size of the original program. In this work, we construct the first iO scheme that achieves only a constant m ..."
Abstract
 Add to MetaCart
Present constructions of indistinguishability obfuscation (iO) create obfuscated programs where the size of the obfuscated program is at least a factor of a security parameter larger than the size of the original program. In this work, we construct the first iO scheme that achieves only a constant
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
, 2013
"... In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C0 and C1 of similar size, the obfuscations of C0 and C1 should be computationally indistinguishable. In functional ..."
Abstract
 Add to MetaCart
In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C0 and C1 of similar size, the obfuscations of C0 and C1 should be computationally indistinguishable
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
, 2014
"... We revisit the question of constructing secure generalpurpose indistinguishability obfuscation (iO), with a security reduction based on explicit computational assumptions. Previous to our work, such reductions were only known to exist based on instancedependent assumptions and/or adhoc assumption ..."
Abstract

Cited by 39 (11 self)
 Add to MetaCart
We revisit the question of constructing secure generalpurpose indistinguishability obfuscation (iO), with a security reduction based on explicit computational assumptions. Previous to our work, such reductions were only known to exist based on instancedependent assumptions and/or ad
Indistinguishability obfuscation from functional encryption. To appear
 in Proceedings of the 56th Annual IEEE Symposium on Foundations of Computer Science (available at https://eprint.iacr.org/2014/163.pdf
, 2015
"... Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. So far, candidate IO constructions were based on specific assumptions on algebraic objects called multilinear graded encodings. We present a generic construction of i ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. So far, candidate IO constructions were based on specific assumptions on algebraic objects called multilinear graded encodings. We present a generic construction
Idea: Benchmarking Indistinguishability Obfuscation – A candidate implementation
"... Abstract. We present the results of preliminary experiments implementing the Candidate Indistinguishability Obfuscation algorithm recently proposed by Garg et al. [1]. We show how different parameters of the input circuits impact the performance and the size of the obfuscated programs. On the nega ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
Abstract. We present the results of preliminary experiments implementing the Candidate Indistinguishability Obfuscation algorithm recently proposed by Garg et al. [1]. We show how different parameters of the input circuits impact the performance and the size of the obfuscated programs
Indistinguishability Obfuscation of Iterated Circuits and RAM programs
, 2014
"... A key source of inefficiency in existing obfuscation schemes is that they operate on programs represented as Boolean circuits or (with stronger assumptions and costlier constructs) as Turing machines. We bring the complexity of obfuscation down to the level of RAM programs. That is, assuming inject ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
injective one way functions and indistinguishability obfuscators for all circuits, we construct indistinguishability obfuscators for RAM programs with the following parameters, up to polylogarithmic factors and a multiplicative factor in the security parameter: (a) The space used by the obfuscated program
Results 1  10
of
3,733