Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a "central hub" for almost all known cryptographic tasks, and as an extremely powerful building block for new cryptographic tasks resolving long-standing and foundational open problems. However, constructions based on indistinguishability obfuscation almost always rely on non-black-box techniques, and thus the extent to which it can be used as a building block has been completely unexplored so far. We present a framework for proving meaningful negative results on the power of indistinguishability obfuscation. By considering indistinguishability obfuscation for oracle-aided circuits, we capture the common techniques that have been used so far i...
© 2017, International Association for Cryptologic Research. Lin and Tessaro (ePrint 2017) recently ...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous no...
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact fun...
Indistinguishability obfuscation is an extraordinarily versatile primitive, leading many to search f...
Indistinguishability obfuscation is an extraordinarily versatile primitive, leading many to search f...
We show general transformations from subexponentially-secure approximate indistinguisha-bility obfus...
Random oracles are powerful cryptographic objects. They facilitate the security proofs of an impres...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
© 2017, International Association for Cryptologic Research. Lin and Tessaro (ePrint 2017) recently ...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous no...
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
In this work, we study indistinguishability obfuscation and functional encryption for general circui...
We show how to construct indistinguishability obfuscation (iO) for circuits from any non-compact fun...
Indistinguishability obfuscation is an extraordinarily versatile primitive, leading many to search f...
Indistinguishability obfuscation is an extraordinarily versatile primitive, leading many to search f...
We show general transformations from subexponentially-secure approximate indistinguisha-bility obfus...
Random oracles are powerful cryptographic objects. They facilitate the security proofs of an impres...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
© 2017, International Association for Cryptologic Research. Lin and Tessaro (ePrint 2017) recently ...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...