Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

The distinction between fixed and random generators in group-based assumptions

J Bartusek, F Ma, M Zhandry - … in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
There is surprisingly little consensus on the precise role of the generator g in group-based
assumptions such as DDH. Some works consider g to be a fixed part of the group …

Multilinear maps from obfuscation

MR Albrecht, P Farshim, S Han, D Hofheinz… - Journal of …, 2020 - Springer
We provide constructions of multilinear groups equipped with natural hard problems from
indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements …

Attribute-based data access control for multi-authority system

AS Shahraki, C Rudolph… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Access control and authorization in universal basic services is one of the main security
issues in distributed systems. In particular, access control in distributed systems, such as in …

Multi-party key exchange for unbounded parties from indistinguishability obfuscation

D Khurana, V Rao, A Sahai - International Conference on the Theory and …, 2015 - Springer
Existing protocols for non-interactive multi-party key exchange either (1) support a bounded
number of users,(2) require a trusted setup, or (3) rely on knowledge-type assumptions. We …

Algebraic generalization of Diffie–Hellman key exchange

J Partala - Journal of Mathematical Cryptology, 2018 - degruyter.com
Abstract The Diffie–Hellman key exchange scheme is one of the earliest and most widely
used public-key primitives. Its underlying algebraic structure is a cyclic group and its security …

Self-Bilinear Map from One Way Encoding System and i𝒪

H Zhang, T Huang, F Zhang, B Wei, Y Du - Information, 2024 - mdpi.com
A bilinear map whose domain and target sets are identical is called a self-bilinear map.
Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals …

The Birth of Cryptographic Obfuscation--A Survey

M Horváth, L Buttyán - Cryptology ePrint Archive, 2015 - eprint.iacr.org
The first candidate indistinguishability obfuscator (iO) of Garg et al.(FOCS 2013) changed
the previously pessimistic attitude towards general-purpose cryptographic obfuscation. The …

Self-Bilinear Map from One Way Encoding System and i.

H Zhang, T Huang, F Zhang, B Wei… - Information (2078 …, 2024 - search.ebscohost.com
A bilinear map whose domain and target sets are identical is called a self-bilinear map.
Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals …

[PDF][PDF] 混淆电路与不可区分混淆

张正, 张方国 - 密码学报, 2019 - jcr.cacrnet.org.cn
混淆电路(garbled circuits) 和混淆(obfuscation) 是密码研究领域中两个非常重要的工具.
混淆电路是由Yao 在安全两方计算问题中提出的一种构造方法发展而来, 混淆则是从代码混淆 …