Abstract. We provide the first standard model construction for a powerful class of Universal Computational Extractors (UCEs; Bellare et al. Crypto 2013) based on indistinguishability obfuscation. Our construction suffices to instantiate correlation-secure hash functions and universal one-way functions. For many cryptographic primitives and in particular for correlation-secure hash functions all known constructions are in the random-oracle model. Indeed, recent negative results by Wichs (ITCS 2013) rule out a large class of techniques to prove the security of correlation-secure hash functions in the standard model. Our construction is based on puncturable PRFs (Sahai und Waters; STOC 2014) and indistinguishability obfuscation. However, our p...
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a "cen...
This paper addresses the fundamental question of whether or not different, exciting primitives now b...
A hash function family $\mathcal{H}$ is correlation intractable for a $t$-input relation $\mathcal{R...
We provide the first standard model construction for a powerful class of Universal Computational Ext...
Abstract. Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CR...
Random oracles are powerful cryptographic objects. They facilitate the security proofs of an impres...
Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CRYPTO 2013)...
Random oracles are powerful cryptographic objects. They facilitate the security proofs of an impress...
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, th...
Assuming the existence of indistinguishability obfuscation (iO), we show that a number of prominent...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
A family of hash functions is called “correlation intractable ” if it is hard to find, given a rando...
Abstract. Assuming the existence of an indistinguishability obfuscator (iO), we show that a number o...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
In a recent celebrated breakthrough, Garg et al. (FOCS 2013) gave the first candidate for so-called...
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a "cen...
This paper addresses the fundamental question of whether or not different, exciting primitives now b...
A hash function family $\mathcal{H}$ is correlation intractable for a $t$-input relation $\mathcal{R...
We provide the first standard model construction for a powerful class of Universal Computational Ext...
Abstract. Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CR...
Random oracles are powerful cryptographic objects. They facilitate the security proofs of an impres...
Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CRYPTO 2013)...
Random oracles are powerful cryptographic objects. They facilitate the security proofs of an impress...
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, th...
Assuming the existence of indistinguishability obfuscation (iO), we show that a number of prominent...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
A family of hash functions is called “correlation intractable ” if it is hard to find, given a rando...
Abstract. Assuming the existence of an indistinguishability obfuscator (iO), we show that a number o...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
In a recent celebrated breakthrough, Garg et al. (FOCS 2013) gave the first candidate for so-called...
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a "cen...
This paper addresses the fundamental question of whether or not different, exciting primitives now b...
A hash function family $\mathcal{H}$ is correlation intractable for a $t$-input relation $\mathcal{R...