Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. So far, candidate IO constructions were based on specific assumptions on algebraic objects called multi-linear graded encodings. We present a generic construction of indistinguishability obfuscation from public-key functional encryption with succinct ciphertexts and sub-exponential security. This shows the equivalence of indistinguishability obfuscation and public-key functional encryption, a primitive that has so far seemed to be much weaker, lacking the power and the staggering range of applications of indistin-guishability obfuscation. As an application, we obtain a new candidate IO construction based on th...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous no...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact fun...
International audienceFunctional encryption lies at the frontiers of the current research in cryptog...
International audienceFunctional encryption lies at the frontiers of the current research in cryptog...
We show general transformations from subexponentially-secure approximate indistinguisha-bility obfus...
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a "cen...
There is some evidence that indistinguishability obfuscation (iO) requires either exponentially many...
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact fun...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous no...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact fun...
International audienceFunctional encryption lies at the frontiers of the current research in cryptog...
International audienceFunctional encryption lies at the frontiers of the current research in cryptog...
We show general transformations from subexponentially-secure approximate indistinguisha-bility obfus...
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a "cen...
There is some evidence that indistinguishability obfuscation (iO) requires either exponentially many...
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact fun...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...