We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,240 results
  1. Computational Wiretap Coding from Indistinguishability Obfuscation

    A wiretap coding scheme for a pair of noisy channels...
    Yuval Ishai, Aayush Jain, ... Mark Zhandry in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  2. On the Complexity of Compressing Obfuscation

    Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to its far-reaching applications in cryptography...

    Gilad Asharov, Ilan Komargodski, ... Naomi Sirkin in Journal of Cryptology
    Article 06 July 2022
  3. Use of cryptography in malware obfuscation

    Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection....

    Hassan Jameel Asghar, Benjamin Zi Hao Zhao, ... Daniel Coscia in Journal of Computer Virology and Hacking Techniques
    Article 25 September 2023
  4. Fully Succinct Batch Arguments for  \(\textsf{NP}\) from Indistinguishability Obfuscation

    Non-interactive batch arguments for \(\textsf{NP} \)...
    Rachit Garg, Kristin Sheridan, ... David J. Wu in Theory of Cryptography
    Conference paper 2022
  5. Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness

    There is some evidence that indistinguishability obfuscation (iO) requires either exponentially many assumptions or (sub)exponentially hard...

    Qipeng Liu, Mark Zhandry in Journal of Cryptology
    Article 06 July 2021
  6. Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation

    A wiretap coding scheme (Wyner in Bell Syst Tech J 54(8):1355–1387, 1975) enables Alice to reliably communicate a message m to an honest Bob by...

    Yuval Ishai, Alexis Korb, ... Amit Sahai in Journal of Cryptology
    Article Open access 18 October 2023
  7. Constructions for Quantum Indistinguishability Obfuscation

    An indistinguishability obfuscator is a polynomial-time probabilistic algorithm that takes a circuit as input and outputs a new circuit that has the...
    Anne Broadbent, Raza Ali Kazmi in Progress in Cryptology – LATINCRYPT 2021
    Conference paper 2021
  8. Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation

    (Fully) homomorphic encryption ((F)HE) allows users to publicly evaluate circuits on encrypted data. Although public homomorphic evaluation property...
    Shingo Sato, Keita Emura, Atsushi Takayasu in Applied Cryptography and Network Security
    Conference paper 2022
  9. Vehicle Trajectory Obfuscation and Detection

    A vehicle in road networks shares location data with other vehicles and location-based services (LBS) through Internet-of-vehicles (IoV). By...
    Baihe Ma, Yueyao Zhao, ... Ren ** Liu in Cybersecurity for Smart Cities
    Chapter 2023
  10. Indistinguishability Obfuscation from LPN over \(\mathbb {F}_p\) , DLIN, and PRGs in NC \(^0\)

    In this work, we study what minimal sets of assumptions suffice for constructing indistinguishability obfuscation (...
    Aayush Jain, Huijia Lin, Amit Sahai in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  11. The Pseudorandom Oracle Model and Ideal Obfuscation

    We introduce a new idealized model of hash functions, which we refer to as the pseudorandom oracle (Pr...
    Aayush Jain, Huijia Lin, ... Daniel Wichs in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  12. Homomorphic Witness Encryption from Indistinguishable Obfuscation

    Witness encryption (WE) is a new encryption paradigm that allows encrypting a message using the instance of a particular NP problem, and someone who...
    Yuzhu Wang, **ngbo Wang, Mingwu Zhang in Provable and Practical Security
    Conference paper 2023
  13. White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation

    Device binding for white-box cryptography ensures that a white-box program is only executable on one specific device and is unusable elsewhere. In...
    Shashank Agrawal, Estuardo Alpírez Bock, ... Gaven Watson in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2023
  14. Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation

    Laconic function evaluation (LFE) is a “flipped” version of fully homomorphic encryption, where the server performing the computation gets the...
    Fangqi Dong, Zihan Hao, ... Daniel Wichs in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  15. COA-Secure Obfuscation and Applications

    We put forth a new paradigm for program obfuscation, where obfuscated programs are endowed with proofs of “well formedness.” In addition to asserting...
    Ran Canetti, Suvradip Chakraborty, ... Manoj Prabhakaran in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  16. Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption

    In a lockable obfuscation scheme, a party called the obfuscator takes as input a circuit...
    Conference paper 2022
  17. R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications

    In recent breakthrough results, novel use of grabled circuits yielded constructions for several primitives like Identity-Based Encryption (IBE) and...
    Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, ... Rajeev Raghunath in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  18. Geo-Indistinguishability

    Ricardo Mendes, João P. Vilela in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2022
  19. Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation

    Cloud storage services allow users to outsource their data to remote cloud servers to relieve from the burden of local data storage and maintenance....

    Lixue Sun, Chunxiang Xu, ... Kefei Chen in International Journal of Information Security
    Article 23 January 2020
  20. Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability

    The increasing use of hand-held devices which have access to location information, has raised the risk of privacy disclosure. To implement privacy...

    Huiwen Luo, Haoming Zhang, ... Yi Lin in Multimedia Tools and Applications
    Article 20 March 2021
Did you find what you were looking for? Share feedback.