Abstract. A re-encryption program (or a circuit) converts a ciphertext encrypted under Alice’s public key pk1 to a ciphertext of the same message encrypted under Bob’s public key pk2. Hohenberger et al. (TCC 2007) constructed a pairing-based obfuscator for a family of circuits implementing the re-encryption functionality under a new notion of obfuscation called as average-case secure obfuscation. Chandran et al. (PKC 2014) proposed a lattice-based construction for the same. The construction given by Hohenberger et al. could only support encryptions of messages from a polynomial space and the decryption algorithm would have to perform a polynomial number of pairing operations in the worst case. The construction given by Chandran et al. satis...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat c...
A re-encryption program (or a circuit) transforms a ciphertext encrypted under Alice\u27s public key...
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a ...
Abstract. We present the first positive obfuscation result for a traditional cryptographic functiona...
Abstract. We present the first positive obfuscation result for a tradi-tional cryptographic function...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
Obfuscation, the task of compiling circuits or programs to make the internal computation un-intellig...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual black-box (VBB)...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
Informally, an obfuscator O is an efficient, probabilistic “compiler ” that transforms a program P i...
There is some evidence that indistinguishability obfuscation (iO) requires either exponentially many...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat c...
A re-encryption program (or a circuit) transforms a ciphertext encrypted under Alice\u27s public key...
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a ...
Abstract. We present the first positive obfuscation result for a traditional cryptographic functiona...
Abstract. We present the first positive obfuscation result for a tradi-tional cryptographic function...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
Obfuscation, the task of compiling circuits or programs to make the internal computation un-intellig...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual black-box (VBB)...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
Informally, an obfuscator O is an efficient, probabilistic “compiler ” that transforms a program P i...
There is some evidence that indistinguishability obfuscation (iO) requires either exponentially many...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat c...