The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, significantly expanding the scope of problems amenable to cryptographic study. All known approaches to constructing iO rely on $d$-linear maps which allow the encoding of elements from a large domain, evaluating degree $d$ polynomials on them, and testing if the output is zero. While secure bilinear maps are well established in cryptographic literature, the security of candidates for $d>2$ is poorly understood. We propose a new approach to constructing iO for general circuits. Unlike all previously known realizations of iO, we avoid the use of $d$-linear maps of degree $d \ge 3$. At the heart of our approach is the assumption that a new weak pse...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to...
We consider the problem of removing subexponential reductions to indistinguishability obfuscation (i...
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our scheme...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexpo...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto’2001], aims to compile program...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Lin and Tessaro (Eprint 2017/250) recently proposed indistinguishability obfuscation and functional ...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
© 2017, International Association for Cryptologic Research. Lin and Tessaro (ePrint 2017) recently ...
We study close connections between Indistinguishability Obfuscation (IO) and the Minimum Circuit Siz...
Thesis: S.M. in Computer Science and Engineering, Massachusetts Institute of Technology, Department ...
We construct indistinguishability obfuscation (iO) solely under circular-security properties of encr...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to...
We consider the problem of removing subexponential reductions to indistinguishability obfuscation (i...
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our scheme...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexpo...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto’2001], aims to compile program...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Lin and Tessaro (Eprint 2017/250) recently proposed indistinguishability obfuscation and functional ...
We show general transformations from subexponentially-secure approximate indistinguishability obfusc...
© 2017, International Association for Cryptologic Research. Lin and Tessaro (ePrint 2017) recently ...
We study close connections between Indistinguishability Obfuscation (IO) and the Minimum Circuit Siz...
Thesis: S.M. in Computer Science and Engineering, Massachusetts Institute of Technology, Department ...
We construct indistinguishability obfuscation (iO) solely under circular-security properties of encr...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to...
We consider the problem of removing subexponential reductions to indistinguishability obfuscation (i...
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our scheme...