A re-encryption program (or a circuit) transforms a ciphertext encrypted under Alice\u27s public key $pk_1$ to a ciphertext of the same message encrypted under Bob\u27s public key $pk_2$. Hohenberger et al. (TCC 2007) constructed a pairing-based obfuscator for a family of circuits implementing the re-encryption functionality under a new notion of obfuscation called as \textit{average-case secure obfuscation}. Chandran et al. (PKC 2014) proposed a lattice-based construction for the same. The construction given by Hohenberger et al. could only support encryptions of messages from a polynomial space and the decryption algorithm may have to perform a polynomial number of pairing operations in the worst case. Moreover, the proof of security rel...
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexpo...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
Abstract. A re-encryption program (or a circuit) converts a ciphertext encrypted under Alice’s publi...
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a ...
Abstract. We present the first positive obfuscation result for a traditional cryptographic functiona...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme ther...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Abstract. We present the first positive obfuscation result for a tradi-tional cryptographic function...
An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphe...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010.This electronic v...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
Informally, an obfuscator O is an efficient, probabilistic “compiler ” that transforms a program P i...
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexpo...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
Abstract. A re-encryption program (or a circuit) converts a ciphertext encrypted under Alice’s publi...
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a ...
Abstract. We present the first positive obfuscation result for a traditional cryptographic functiona...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme ther...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Abstract. We present the first positive obfuscation result for a tradi-tional cryptographic function...
An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphe...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010.This electronic v...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
Informally, an obfuscator O is an efficient, probabilistic “compiler ” that transforms a program P i...
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexpo...
International audienceWe consider the problem of removing subexponential reductions to indistinguish...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...