Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

SNARGs for from LWE

AR Choudhuri, A Jain, Z Jin - 2021 IEEE 62nd Annual …, 2022 - ieeexplore.ieee.org
We provide the first construction of a succinct non-interactive argument (SNARG) for all
polynomial time deterministic computations based on standard assumptions. For T steps of …

SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE

R Jawale, YT Kalai, D Khurana, R Zhang - Proceedings of the 53rd …, 2021 - dl.acm.org
We construct a succinct non-interactive publicly-verifiable delegation scheme for any log-
space uniform circuit under the sub-exponential Learning With Errors (LWE) assumption. For …

SNARGs for P from sub-exponential DDH and QR

J Hulett, R Jawale, D Khurana, A Srinivasan - … International Conference on …, 2022 - Springer
We obtain publicly verifiable Succinct Non-Interactive Arguments (SNARGs) for arbitrary
deterministic computations and bounded space non-deterministic computation from …

How to delegate computations publicly

YT Kalai, O Paneth, L Yang - Proceedings of the 51st Annual ACM …, 2019 - dl.acm.org
We construct a delegation scheme for all polynomial time computations. Our scheme is
publicly verifiable and completely non-interactive in the common reference string (CRS) …

On the optimal succinctness and efficiency of functional encryption and attribute-based encryption

A Jain, H Lin, J Luo - Annual International Conference on the Theory and …, 2023 - Springer
We investigate the best-possible (asymptotic) efficiency of functional encryption (FE) and
attribute-based encryption (ABE) by proving inherent space-time trade-offs and constructing …

Non-interactive delegation and batch NP verification from standard computational assumptions

Z Brakerski, J Holmgren, Y Kalai - Proceedings of the 49th Annual ACM …, 2017 - dl.acm.org
We present an adaptive and non-interactive protocol for verifying arbitrary efficient
computations in fixed polynomial time. Our protocol is computationally sound and can be …

Compact Adaptively Secure ABE from k-Lin: Beyond and Towards

H Lin, J Luo - Annual International Conference on the Theory and …, 2020 - Springer
We present a new general framework for constructing compact and adaptively secure
attribute-based encryption (ABE) schemes from k-Lin in asymmetric bilinear pairing groups …

Delegating RAM computations

Y Kalai, O Paneth - Theory of Cryptography: 14th International Conference …, 2016 - Springer
In the setting of cloud computing a user wishes to delegate its data, as well as computations
over this data, to a cloud provider. Each computation may read and modify the data, and …

Be adaptive, avoid overcommitting

Z Jafargholi, C Kamath, K Klein, I Komargodski… - Annual International …, 2017 - Springer
For many cryptographic primitives, it is relatively easy to achieve selective security (where
the adversary commits a-priori to some of the choices to be made later in the attack) but …