We construct indistinguishability obfuscation (iO) solely under circular-security properties of encryption schemes based on the Learning with Errors (LWE) problem. Circular-security assumptions were used before to construct (non-leveled) fully-homomorphic encryption (FHE), but our assumption is stronger and requires circular randomness-leakage-resilience. In contrast with prior works, this assumption can be conjectured to be post-quantum secure; yielding the first provably secure iO construction that is (plausibly) post-quantum secure. Our work follows the high-level outline of the recent work of Gay and Pass [ePrint 2020], who showed a way to remove the heuristic step from the homomorphic-encryption based iO approach of Brakerski, Döttli...
Fully homomorphic encryption (FHE) is a powerful notion of encryption which allows data to be encryp...
We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our c...
At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They proposed fi...
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexpo...
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our scheme...
In a lockable obfuscation scheme, a party called the obfuscator takes as input a circuit $\Circ$, a ...
Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypt...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, signifi...
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme ther...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
Encryption schemes often derive their power from the properties of the underlying algebra on the sym...
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m...
Fully homomorphic encryption (FHE) is a powerful notion of encryption which allows data to be encryp...
We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our c...
At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They proposed fi...
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexpo...
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our scheme...
In a lockable obfuscation scheme, a party called the obfuscator takes as input a circuit $\Circ$, a ...
Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypt...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, signifi...
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme ther...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
Encryption schemes often derive their power from the properties of the underlying algebra on the sym...
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m...
Fully homomorphic encryption (FHE) is a powerful notion of encryption which allows data to be encryp...
We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our c...
At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They proposed fi...