R Gay, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexponential security of:(a) the Learning with Errors (LWE) assumption (with …
R Pass, K Seth, S Telang - Advances in Cryptology–CRYPTO 2014: 34th …, 2014 - Springer
We define a notion of semantic security of multilinear (aka graded) encoding schemes, which stipulates security of a class of algebraic “decisional” assumptions: roughly speaking …
V Goyal, A Kumar - Advances in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
Abstract Goyal and Kumar (STOC'18) recently introduced the notion of non-malleable secret sharing. Very roughly, the guarantee they seek is the following: the adversary may …
A program obfuscator takes a program and outputs a" scrambled" version of it, where the goal is that the obfuscated program will not reveal much about its structure beyond what is …
In a recent work, Kumar, Meka, and Sahai (FOCS 2019) introduced the notion of bounded collusion protocols (BCPs). BCPs are multiparty communication protocols in which N parties …
Secret sharing schemes allow a dealer to distribute a secret piece of information among several parties such that only qualified subsets of parties can reconstruct the secret. The …
A Kumar, R Meka, A Sahai - 2019 IEEE 60th Annual …, 2019 - ieeexplore.ieee.org
In this work, we consider the natural goal of designing secret sharing schemes that ensure security against an adversary who may learn some “leaked''information about all the shares …
M Zhandry - Theory of Cryptography: 13th International Conference …, 2016 - Springer
We propose a new cryptographic primitive called witness pseudorandom functions (witness PRFs). Witness PRFs are related to witness encryption, but appear strictly stronger: we show …
We show by counter-example that the soundness security requirement for witness encryption given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the …