Over the last decade, indistinguishability obfuscation (iO) has emerged as a seemingly omnipotent primitive in cryptography. Moreover, recent breakthrough work has demonstrated that iO can be realized from well-founded assumptions. A thorn to all this remarkable progress is a limitation of all known constructions of general-purpose iO: the security reduction incurs a loss that is exponential in the input length of the function. This ``input-length barrier\u27\u27 to iO stems from the non-falsifiability of the iO definition and is discussed in folklore as being possibly inherent. It has many negative consequences; notably, constructing iO for programs with inputs of unbounded length remains elusive due to this barrier. We present a new...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous no...
Garbled circuits, introduced by Yao in the mid 80s, allow computing a function f on an input x witho...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
We consider the problem of removing subexponential reductions to indistinguishability obfuscation (i...
Code obfuscation has been one of the main focal points of cryptographic research over the last few y...
We study the asymptotic efficiency of indistinguishability obfuscation (iO) on two fronts: - Obfusc...
We show that the common proof technique of padding a circuit before IO obfuscation is sometimes nece...
We show that the common proof technique of padding a circuit before IO obfuscation is sometimes nece...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to...
We study close connections between Indistinguishability Obfuscation (IO) and the Minimum Circuit Siz...
The dream of software obfuscation is to take programs, as they are, and then generically compile the...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous no...
Garbled circuits, introduced by Yao in the mid 80s, allow computing a function f on an input x witho...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
We consider the problem of removing subexponential reductions to indistinguishability obfuscation (i...
Code obfuscation has been one of the main focal points of cryptographic research over the last few y...
We study the asymptotic efficiency of indistinguishability obfuscation (iO) on two fronts: - Obfusc...
We show that the common proof technique of padding a circuit before IO obfuscation is sometimes nece...
We show that the common proof technique of padding a circuit before IO obfuscation is sometimes nece...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to...
We study close connections between Indistinguishability Obfuscation (IO) and the Minimum Circuit Siz...
The dream of software obfuscation is to take programs, as they are, and then generically compile the...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
© 2018 Association for Computing Machinery. Indistinguishability obfuscation (IO) is a tremendous no...
Garbled circuits, introduced by Yao in the mid 80s, allow computing a function f on an input x witho...