The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. Barak's technique has given rise to various powerful applications and is a key component in all known protocols with non-black-box simulation. We present the first non-black-box simulation technique that does not rely on Barak's technique (or on nonstandard assumptions). Invoking this technique, we obtain new and improved protocols resilient to various resetting attacks. These improvements include weaker computational assumptions and better round complexity. A prominent feature of our technique is its compatibility with rewinding techniques from classic black-box ...
Abstract. The concept of zero-knowledge proofs has been around for about 25 years. It has been redef...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
Abstract. The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a m...
The simulation paradigm, introduced by Goldwasser, Micali and Rackoff, is of fundamental importance ...
The traditional notion of {\em program obfuscation} requires that an obfuscation $\tilde{f}$ of a pr...
The notion of simulation is central to cryptography: often, to demonstrate that an adversary did not...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
We present a new zero-knowledge argument protocol by relying on the non-black-box simulation techniq...
As recent studies show, the notions of program obfuscation and zero knowledge are intimately connect...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
Recently, Goyal (STOC’13) proposed a new non-black-box simulation techniques for fully concurrent ze...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat c...
Abstract. The concept of zero-knowledge proofs has been around for about 25 years. It has been redef...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
Abstract. The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a m...
The simulation paradigm, introduced by Goldwasser, Micali and Rackoff, is of fundamental importance ...
The traditional notion of {\em program obfuscation} requires that an obfuscation $\tilde{f}$ of a pr...
The notion of simulation is central to cryptography: often, to demonstrate that an adversary did not...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
We present a new zero-knowledge argument protocol by relying on the non-black-box simulation techniq...
As recent studies show, the notions of program obfuscation and zero knowledge are intimately connect...
In this paper we show that the existence of general indistinguishability obfuscators conjectured in ...
Recently, Goyal (STOC’13) proposed a new non-black-box simulation techniques for fully concurrent ze...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat c...
Abstract. The concept of zero-knowledge proofs has been around for about 25 years. It has been redef...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...