Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Indistinguishability obfuscation from circular security

R Gay, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …

Indistinguishability obfuscation from semantically-secure multilinear encodings

R Pass, K Seth, S Telang - Advances in Cryptology–CRYPTO 2014: 34th …, 2014 - Springer
We define a notion of semantic security of multilinear (aka graded) encoding schemes,
which stipulates security of a class of algebraic “decisional” assumptions: roughly speaking …

Non-malleable secret sharing for general access structures

V Goyal, A Kumar - Advances in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
Abstract Goyal and Kumar (STOC'18) recently introduced the notion of non-malleable secret
sharing. Very roughly, the guarantee they seek is the following: the adversary may …

One-way functions and (im) perfect obfuscation

I Komargodski, T Moran, M Naor, R Pass… - 2014 IEEE 55th …, 2014 - ieeexplore.ieee.org
A program obfuscator takes a program and outputs a" scrambled" version of it, where the
goal is that the obfuscated program will not reveal much about its structure beyond what is …

Extractors and secret sharing against bounded collusion protocols

E Chattopadhyay, J Goodman, V Goyal… - 2020 IEEE 61st …, 2020 - ieeexplore.ieee.org
In a recent work, Kumar, Meka, and Sahai (FOCS 2019) introduced the notion of bounded
collusion protocols (BCPs). BCPs are multiparty communication protocols in which N parties …

How to share a secret, infinitely

I Komargodski, M Naor, E Yogev - … , TCC 2016-B, Beijing, China, October …, 2016 - Springer
Secret sharing schemes allow a dealer to distribute a secret piece of information among
several parties such that only qualified subsets of parties can reconstruct the secret. The …

Leakage-resilient secret sharing against colluding parties

A Kumar, R Meka, A Sahai - 2019 IEEE 60th Annual …, 2019 - ieeexplore.ieee.org
In this work, we consider the natural goal of designing secret sharing schemes that ensure
security against an adversary who may learn some “leaked''information about all the shares …

How to avoid obfuscation using witness PRFs

M Zhandry - Theory of Cryptography: 13th International Conference …, 2016 - Springer
We propose a new cryptographic primitive called witness pseudorandom functions (witness
PRFs). Witness PRFs are related to witness encryption, but appear strictly stronger: we show …

Adaptive witness encryption and asymmetric password-based cryptography

M Bellare, VT Hoang - Public-Key Cryptography--PKC 2015: 18th IACR …, 2015 - Springer
We show by counter-example that the soundness security requirement for witness
encryption given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the …