Bitansky, Nir; Degwekar, Akshay; Vaikuntanathan, Vinod Structure versus hardness through the obfuscation Lens. (English) Zbl 07307642 SIAM J. Comput. 50, 98-144 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., SIAM J. Comput. 50, 98--144 (2021; Zbl 07307642) Full Text: DOI
Fenteany, Peter; Fuller, Benjamin Same point composable and nonmalleable obfuscated point functions. (English) Zbl 07314388 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 124-144 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{P. Fenteany} and \textit{B. Fuller}, Lect. Notes Comput. Sci. 12147, 124--144 (2020; Zbl 07314388) Full Text: DOI
Chvojka, Peter; Jager, Tibor; Kakvi, Saqib A. Offline witness encryption with semi-adaptive security. (English) Zbl 07314285 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 231-250 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{P. Chvojka} et al., Lect. Notes Comput. Sci. 12146, 231--250 (2020; Zbl 07314285) Full Text: DOI
Lai, Junzuo; Huang, Zhengan; Au, Man Ho; Mao, Xianping Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. (English) Zbl 07270962 Theor. Comput. Sci. 847, 1-16 (2020). MSC: 68Q PDF BibTeX XML Cite \textit{J. Lai} et al., Theor. Comput. Sci. 847, 1--16 (2020; Zbl 07270962) Full Text: DOI
Li, Jiguo; Hu, Shengzhou; Zhang, Yichen; Han, Jinguang A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation. (English) Zbl 1436.94079 Soft Comput. 24, No. 3, 1869-1882 (2020). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Li} et al., Soft Comput. 24, No. 3, 1869--1882 (2020; Zbl 1436.94079) Full Text: DOI
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 07211773 J. Cryptology 33, No. 3, 1080-1113 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{M. R. Albrecht} et al., J. Cryptology 33, No. 3, 1080--1113 (2020; Zbl 07211773) Full Text: DOI
Komargodski, Ilan; Segev, Gil From minicrypt to obfustopia via private-key functional encryption. (English) Zbl 07194392 J. Cryptology 33, No. 2, 406-458 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{I. Komargodski} and \textit{G. Segev}, J. Cryptology 33, No. 2, 406--458 (2020; Zbl 07194392) Full Text: DOI
Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel From cryptomania to obfustopia through secret-key functional encryption. (English) Zbl 1435.94123 J. Cryptology 33, No. 2, 357-405 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., J. Cryptology 33, No. 2, 357--405 (2020; Zbl 1435.94123) Full Text: DOI
Wang, Huige; Zhang, Yuan; Chen, Kefei; Sui, Guangye; Zhao, Yunlei; Huang, Xinyi Functional broadcast encryption with applications to data sharing for cloud storage. (English) Zbl 1453.68069 Inf. Sci. 502, 109-124 (2019). MSC: 68P25 68M11 68P20 PDF BibTeX XML Cite \textit{H. Wang} et al., Inf. Sci. 502, 109--124 (2019; Zbl 1453.68069) Full Text: DOI
Chen, Yu; Zhang, Jiang; Deng, Yi; Chang, Jinyong KDM security for identity-based encryption: constructions and separations. (English) Zbl 1451.68092 Inf. Sci. 486, 450-473 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Y. Chen} et al., Inf. Sci. 486, 450--473 (2019; Zbl 1451.68092) Full Text: DOI
Pan, Dongxue; Liang, Bei; Li, Hongda; Ni, Peifang Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications. (English) Zbl 1439.94054 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 609-619 (2019). MSC: 94A60 68M25 68P27 PDF BibTeX XML Cite \textit{D. Pan} et al., Lect. Notes Comput. Sci. 11547, 609--619 (2019; Zbl 1439.94054) Full Text: DOI
Hofheinz, Dennis; Ursu, Bogdan Dual-mode NIZKs from obfuscation. (English) Zbl 07202416 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-34577-8/pbk; 978-3-030-34578-5/ebook). Lecture Notes in Computer Science 11921, 311-341 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Hofheinz} and \textit{B. Ursu}, Lect. Notes Comput. Sci. 11921, 311--341 (2019; Zbl 07202416) Full Text: DOI
Pan, Dongxue; Liang, Bei; Li, Hongda; Ni, Peifang Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications. (English) Zbl 07199466 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-35422-0/pbk; 978-3-030-35423-7/ebook). Lecture Notes in Computer Science 11898, 297-317 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Pan} et al., Lect. Notes Comput. Sci. 11898, 297--317 (2019; Zbl 07199466) Full Text: DOI
Coron, Jean-Sébastien; Notarnicola, Luca Cryptanalysis of CLT13 multilinear maps with independent slots. (English) Zbl 07196567 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-34620-1/pbk; 978-3-030-34621-8/ebook). Lecture Notes in Computer Science 11922, 356-385 (2019). MSC: 94A60 68Q17 PDF BibTeX XML Cite \textit{J.-S. Coron} and \textit{L. Notarnicola}, Lect. Notes Comput. Sci. 11922, 356--385 (2019; Zbl 07196567) Full Text: DOI
Coron, Jean-Sébastien; Pereira, Hilder V. L. On Kilian’s randomization of multilinear map encodings. (English) Zbl 07196566 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-34620-1/pbk; 978-3-030-34621-8/ebook). Lecture Notes in Computer Science 11922, 325-355 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J.-S. Coron} and \textit{H. V. L. Pereira}, Lect. Notes Comput. Sci. 11922, 325--355 (2019; Zbl 07196566) Full Text: DOI
Bitansky, Nir; Degwekar, Akshay On the complexity of collision resistant hash functions: new and old black-box separations. (English) Zbl 07195428 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-36029-0/pbk; 978-3-030-36030-6/ebook). Lecture Notes in Computer Science 11891, 422-450 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{N. Bitansky} and \textit{A. Degwekar}, Lect. Notes Comput. Sci. 11891, 422--450 (2019; Zbl 07195428) Full Text: DOI
Cheon, Jung Hee; Cho, Wonhee; Hhan, Minki; Kim, Jiseung; Lee, Changmin Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map. (English) Zbl 1436.94047 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 253-283 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{J. H. Cheon} et al., Lect. Notes Comput. Sci. 11694, 253--283 (2019; Zbl 1436.94047) Full Text: DOI
Cheng, Xiaoyang; Lin, Yan; Gao, Debin; Jia, Chunfu DynOpVm: VM-based software obfuscation with dynamic opcode mapping. (English) Zbl 07160788 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-21567-5/pbk; 978-3-030-21568-2/ebook). Lecture Notes in Computer Science 11464, 155-174 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{X. Cheng} et al., Lect. Notes Comput. Sci. 11464, 155--174 (2019; Zbl 07160788) Full Text: DOI
Pan, Dongxue; Liang, Bei; Li, Hongda; Ni, Peifang Hierarchical functional signcryption: notion and construction. (English) Zbl 1426.94119 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 167-185 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Pan} et al., Lect. Notes Comput. Sci. 11821, 167--185 (2019; Zbl 1426.94119) Full Text: DOI
Ghatak, Debolina; Roy, Bimal K. Conditional masking to numerical data. (English) Zbl 07097973 J. Stat. Theory Pract. 13, No. 3, Paper No. 44, 25 p. (2019). MSC: 68P PDF BibTeX XML Cite \textit{D. Ghatak} and \textit{B. K. Roy}, J. Stat. Theory Pract. 13, No. 3, Paper No. 44, 25 p. (2019; Zbl 07097973) Full Text: DOI
Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation. (English) Zbl 07096133 Algorithmica 81, No. 9, 3245-3390 (2019). MSC: 94A60 68Q04 PDF BibTeX XML Cite \textit{P. Datta} et al., Algorithmica 81, No. 9, 3245--3390 (2019; Zbl 07096133) Full Text: DOI
Zhandry, Mark The magic of elfs. (English) Zbl 07093635 J. Cryptology 32, No. 3, 825-866 (2019). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{M. Zhandry}, J. Cryptology 32, No. 3, 825--866 (2019; Zbl 07093635) Full Text: DOI
Dachman-Soled, Dana; Gordon, S. Dov; Liu, Feng-Hao; O’Neill, Adam; Zhou, Hong-Sheng Leakage resilience from program obfuscation. (English) Zbl 1446.94122 J. Cryptology 32, No. 3, 742-824 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Dachman-Soled} et al., J. Cryptology 32, No. 3, 742--824 (2019; Zbl 1446.94122) Full Text: DOI
Zhang, Huang; Zhang, Fangguo; Cheng, Rong; Tian, Haibo Efficient obfuscation for CNF circuits and applications in cloud computing. (English) Zbl 1415.68067 Soft Comput. 23, No. 6, 2061-2072 (2019). MSC: 68P25 68M11 94A60 94C10 PDF BibTeX XML Cite \textit{H. Zhang} et al., Soft Comput. 23, No. 6, 2061--2072 (2019; Zbl 1415.68067) Full Text: DOI
Shang, Tao; Chen, Ran-yi-liu; Liu, Jian-wei On the obfuscatability of quantum point functions. (English) Zbl 1409.81039 Quantum Inf. Process. 18, No. 2, Paper No. 55, 16 p. (2019). MSC: 81P94 94A60 68Q05 68P25 94A62 81P68 PDF BibTeX XML Cite \textit{T. Shang} et al., Quantum Inf. Process. 18, No. 2, Paper No. 55, 16 p. (2019; Zbl 1409.81039) Full Text: DOI
Di Crescenzo, Giovanni; Bahler, Lisa; Coan, Brian Cryptographic password obfuscation. (English) Zbl 07297648 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 497-512 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Di Crescenzo} et al., Lect. Notes Comput. Sci. 11149, 497--512 (2018; Zbl 07297648) Full Text: DOI
Impagliazzo, Russell; Kabanets, Valentine; Volkovich, Ilya The power of natural properties as oracles. (English) Zbl 1441.68060 Servedio, Rocco A. (ed.), 33rd computational complexity conference, CCC 2018, June 22–24, 2018, San Diego, California, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 102, Article 7, 20 p. (2018). MSC: 68Q15 68Q06 68Q17 68W20 PDF BibTeX XML Cite \textit{R. Impagliazzo} et al., LIPIcs -- Leibniz Int. Proc. Inform. 102, Article 7, 20 p. (2018; Zbl 1441.68060) Full Text: DOI
Liang, Mingyue; Li, Zhoujun; Zeng, Qiang; Fang, Zhejun Deobfuscation of virtualization-obfuscated code through symbolic execution and compilation optimization. (English) Zbl 1452.94071 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 313-324 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Liang} et al., Lect. Notes Comput. Sci. 10631, 313--324 (2018; Zbl 1452.94071) Full Text: DOI
Asharov, Gilad; Ephraim, Naomi; Komargodski, Ilan; Pass, Rafael On the complexity of compressing obfuscation. (English) Zbl 07216166 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-96877-3/pbk; 978-3-319-96878-0/ebook). Lecture Notes in Computer Science 10993, 753-783 (2018). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{G. Asharov} et al., Lect. Notes Comput. Sci. 10993, 753--783 (2018; Zbl 07216166) Full Text: DOI
Zhang, Mingwu; Jiang, Yan; Shen, Hua; Li, Bingbing; Susilo, Willy Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation. (English) Zbl 07124882 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 240-259 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Zhang} et al., Lect. Notes Comput. Sci. 11449, 240--259 (2018; Zbl 07124882) Full Text: DOI
Bitansky, Nir; Vaikuntanathan, Vinod Indistinguishability obfuscation from functional encryption. (English) Zbl 1407.94087 J. ACM 65, No. 6, Article No. 39, 37 p. (2018). MSC: 94A60 68Q15 PDF BibTeX XML Cite \textit{N. Bitansky} and \textit{V. Vaikuntanathan}, J. ACM 65, No. 6, Article No. 39, 37 p. (2018; Zbl 1407.94087) Full Text: DOI
Biryukov, Alex; Udovenko, Aleksei Attacks and countermeasures for white-box designs. (English) Zbl 1446.94104 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 373-402 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Biryukov} and \textit{A. Udovenko}, Lect. Notes Comput. Sci. 11273, 373--402 (2018; Zbl 1446.94104) Full Text: DOI
Canetti, Ran; Lichtenberg, Amit Certifying trapdoor permutations, revisited. (English) Zbl 1443.94049 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 476-506 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Canetti} and \textit{A. Lichtenberg}, Lect. Notes Comput. Sci. 11239, 476--506 (2018; Zbl 1443.94049) Full Text: DOI
Taub, Bart Inconspicuousness and obfuscation: how large shareholders dynamically manipulate output and information for trading purposes. (English) Zbl 1418.91591 Ann. Finance 14, No. 4, 429-464 (2018). MSC: 91G50 91B44 PDF BibTeX XML Cite \textit{B. Taub}, Ann. Finance 14, No. 4, 429--464 (2018; Zbl 1418.91591) Full Text: DOI
Agrawal, Shweta; Maitra, Monosij FE and iO for Turing machines from minimal assumptions. (English) Zbl 1430.94053 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 473-512 (2018). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{S. Agrawal} and \textit{M. Maitra}, Lect. Notes Comput. Sci. 11240, 473--512 (2018; Zbl 1430.94053) Full Text: DOI
Garg, Sanjam; Srinivasan, Akshayaram A simple construction of iO for Turing machines. (English) Zbl 1430.94069 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 425-454 (2018). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{S. Garg} and \textit{A. Srinivasan}, Lect. Notes Comput. Sci. 11240, 425--454 (2018; Zbl 1430.94069) Full Text: DOI
Cohen, Aloni; Holmgren, Justin; Nishimaki, Ryo; Vaikuntanathan, Vinod; Wichs, Daniel Watermarking cryptographic capabilities. (English) Zbl 1443.94052 SIAM J. Comput. 47, No. 6, 2157-2202 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Cohen} et al., SIAM J. Comput. 47, No. 6, 2157--2202 (2018; Zbl 1443.94052) Full Text: DOI
Komargodski, Ilan; Zhandry, Mark Cutting-edge cryptography through the lens of secret sharing. (English) Zbl 1429.94061 Inf. Comput. 263, 75-96 (2018). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{I. Komargodski} and \textit{M. Zhandry}, Inf. Comput. 263, 75--96 (2018; Zbl 1429.94061) Full Text: DOI
Hämäläinen, Saara Competitive search obfuscation. (English) Zbl 1402.91263 J. Econ. Dyn. Control 97, 38-63 (2018). MSC: 91B42 90B40 90C39 PDF BibTeX XML Cite \textit{S. Hämäläinen}, J. Econ. Dyn. Control 97, 38--63 (2018; Zbl 1402.91263) Full Text: DOI
Bruni, Roberto; Giacobazzi, Roberto; Gori, Roberta Code obfuscation against abstraction refinement attacks. (English) Zbl 1425.68065 Formal Asp. Comput. 30, No. 6, 685-711 (2018). MSC: 68N30 68Q60 PDF BibTeX XML Cite \textit{R. Bruni} et al., Formal Asp. Comput. 30, No. 6, 685--711 (2018; Zbl 1425.68065) Full Text: DOI
Qian, Chen; Tibouchi, Mehdi; Géraud, Rémi Universal witness signatures. (English) Zbl 1398.94152 Inomata, Atsuo (ed.) et al., Advances in information and computer security. 13th international workshop on security, IWSEC 2018, Sendai, Japan, September 3–5, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-97915-1/pbk; 978-3-319-97916-8/ebook). Lecture Notes in Computer Science 11049, 313-329 (2018). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{C. Qian} et al., Lect. Notes Comput. Sci. 11049, 313--329 (2018; Zbl 1398.94152) Full Text: DOI
Lai, Junzuo; Huang, Zhengan; Au, Man Ho; Mao, Xianping Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. (English) Zbl 1444.94080 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 805-812 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 10946, 805--812 (2018; Zbl 1444.94080) Full Text: DOI
Asharov, Gilad; Segev, Gil On constructing one-way permutations from indistinguishability obfuscation. (English) Zbl 1400.94112 J. Cryptology 31, No. 3, 698-736 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Asharov} and \textit{G. Segev}, J. Cryptology 31, No. 3, 698--736 (2018; Zbl 1400.94112) Full Text: DOI
Barthelemy, Lucas; Kahrobaei, Delaram; Renault, Guénaël; Šunić, Zoran Quadratic time algorithm for inversion of binary permutation polynomials. (English) Zbl 1398.11155 Davenport, James H. (ed.) et al., Mathematical software – ICMS 2018. 6th international conference, South Bend, IN, USA, July 24–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-96417-1/pbk; 978-3-319-96418-8/ebook). Lecture Notes in Computer Science 10931, 19-27 (2018). MSC: 11Y16 11T06 94A60 PDF BibTeX XML Cite \textit{L. Barthelemy} et al., Lect. Notes Comput. Sci. 10931, 19--27 (2018; Zbl 1398.11155) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Garg, Sanjam; Holmgren, Justin; Jain, Abhishek; Lin, Huijia; Pass, Rafael; Telang, Sidharth; Vaikuntanathan, Vinod Indistinguishability obfuscation for RAM programs and succinct randomized encodings. (English) Zbl 1396.68041 SIAM J. Comput. 47, No. 3, 1123-1210 (2018). MSC: 68P25 68Q10 68W20 PDF BibTeX XML Cite \textit{N. Bitansky} et al., SIAM J. Comput. 47, No. 3, 1123--1210 (2018; Zbl 1396.68041) Full Text: DOI
Mittelbach, Arno; Venturi, Daniele Fiat-Shamir for highly sound protocols is instantiable. (English) Zbl 1408.94953 Theor. Comput. Sci. 740, 28-62 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Mittelbach} and \textit{D. Venturi}, Theor. Comput. Sci. 740, 28--62 (2018; Zbl 1408.94953) Full Text: DOI
Farshim, Pooya; Hesse, Julia; Hofheinz, Dennis; Larraia, Enrique Graded encoding schemes from obfuscation. (English) Zbl 1420.94061 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 371-400 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 10770, 371--400 (2018; Zbl 1420.94061) Full Text: DOI
Agrikola, Thomas; Hofheinz, Dennis Interactively secure groups from obfuscation. (English) Zbl 1420.94030 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 341-370 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Agrikola} and \textit{D. Hofheinz}, Lect. Notes Comput. Sci. 10770, 341--370 (2018; Zbl 1420.94030) Full Text: DOI
Kumawat, Sudhakar; Paul, Souradyuti A new constant-size accountable ring signature scheme without random oracles. (English) Zbl 1426.94147 Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 157-179 (2018). MSC: 94A62 PDF BibTeX XML Cite \textit{S. Kumawat} and \textit{S. Paul}, Lect. Notes Comput. Sci. 10726, 157--179 (2018; Zbl 1426.94147) Full Text: DOI
Wu, Yi-Chin; Raman, Vasumathi; Rawlings, Blake C.; Lafortune, Stéphane; Seshia, Sanjit A. Synthesis of obfuscation policies to ensure privacy and utility. (English) Zbl 1426.68085 J. Autom. Reasoning 60, No. 1, 107-131 (2018). MSC: 68P27 68Q45 68Q85 91A80 PDF BibTeX XML Cite \textit{Y.-C. Wu} et al., J. Autom. Reasoning 60, No. 1, 107--131 (2018; Zbl 1426.68085) Full Text: DOI
Apon, Daniel; Döttling, Nico; Garg, Sanjam; Mukherjee, Pratyay Cryptanalysis of indistinguishability obfuscations of circuits over GGH13. (English) Zbl 1441.94068 Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 38, 16 p. (2017). MSC: 94A60 68P05 68Q06 PDF BibTeX XML Cite \textit{D. Apon} et al., LIPIcs -- Leibniz Int. Proc. Inform. 80, Article 38, 16 p. (2017; Zbl 1441.94068) Full Text: DOI
Iovino, Vincenzo; Żebrowski, Karol Mergeable functional encryption. (English) Zbl 1439.94035 Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 434-451 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Iovino} and \textit{K. Żebrowski}, Lect. Notes Comput. Sci. 10005, 434--451 (2017; Zbl 1439.94035) Full Text: DOI
Fernando, Rex; Rasmussen, Peter M. R.; Sahai, Amit Preventing CLT attacks on obfuscation with linear overhead. (English) Zbl 1417.94060 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 242-271 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Fernando} et al., Lect. Notes Comput. Sci. 10626, 242--271 (2017; Zbl 1417.94060) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. (English) Zbl 1405.94064 Algorithmica 79, No. 4, 1353-1373 (2017). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{S. Garg} et al., Algorithmica 79, No. 4, 1353--1373 (2017; Zbl 1405.94064) Full Text: DOI
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. (English) Zbl 1405.94091 Algorithmica 79, No. 4, 1286-1317 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Yamakawa} et al., Algorithmica 79, No. 4, 1286--1317 (2017; Zbl 1405.94091) Full Text: DOI
Boneh, Dan; Zhandry, Mark Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. (English) Zbl 1405.94045 Algorithmica 79, No. 4, 1233-1285 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Boneh} and \textit{M. Zhandry}, Algorithmica 79, No. 4, 1233--1285 (2017; Zbl 1405.94045) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer On virtual grey box obfuscation for general circuits. (English) Zbl 1397.94050 Algorithmica 79, No. 4, 1014-1051 (2017). MSC: 94A60 94C10 PDF BibTeX XML Cite \textit{N. Bitansky} et al., Algorithmica 79, No. 4, 1014--1051 (2017; Zbl 1397.94050) Full Text: DOI
Bitansky, Nir; Degwekar, Akshay; Vaikuntanathan, Vinod Structure vs. hardness through the obfuscation lens. (English) Zbl 1407.94086 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 696-723 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 10401, 696--723 (2017; Zbl 1407.94086) Full Text: DOI
Nishimaki, Ryo Watermarking cryptographic programs. (English) Zbl 1410.94101 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 521-543 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Nishimaki}, Lect. Notes Comput. Sci. 10311, 521--543 (2017; Zbl 1410.94101) Full Text: DOI
Chen, Yilei; Gentry, Craig; Halevi, Shai Cryptanalyses of candidate branching program obfuscators. (English) Zbl 1415.94418 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10212, 278-307 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Chen} et al., Lect. Notes Comput. Sci. 10212, 278--307 (2017; Zbl 1415.94418) Full Text: DOI
Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav Constrained pseudorandom functions for unconstrained inputs revisited: achieving verifiability and key delegation. (English) Zbl 1400.94139 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 463-493 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 10175, 463--493 (2017; Zbl 1400.94139) Full Text: DOI
Komargodski, Ilan; Naor, Moni; Yogev, Eylon Secret-sharing for NP. (English) Zbl 1377.94057 J. Cryptology 30, No. 2, 444-469 (2017). MSC: 94A60 94A62 68Q17 PDF BibTeX XML Cite \textit{I. Komargodski} et al., J. Cryptology 30, No. 2, 444--469 (2017; Zbl 1377.94057) Full Text: DOI
Tang, Xiaoxiao; Liang, Yu; Ma, Xinjie; Lin, Yan; Gao, Debin On the effectiveness of code-reuse-based Android application obfuscation. (English) Zbl 06720948 Hong, Seokhie (ed.) et al., Information security and cryptology – ICISC 2016. 19th international conference, Seoul, South Korea, November 30 – December 2, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-53176-2/pbk; 978-3-319-53177-9/ebook). Lecture Notes in Computer Science 10157, 333-349 (2017). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{X. Tang} et al., Lect. Notes Comput. Sci. 10157, 333--349 (2017; Zbl 06720948) Full Text: DOI
Lan, Xiao; Xu, Jing; Guo, Hui; Zhang, Zhenfeng One-round cross-domain group key exchange protocol in the standard model. (English) Zbl 1404.94088 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 386-400 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{X. Lan} et al., Lect. Notes Comput. Sci. 10143, 386--400 (2017; Zbl 1404.94088) Full Text: DOI
Jing, Wenpan; Lu, Xianhui; Li, Bao Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation. (English) Zbl 1404.94083 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 291-308 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Jing} et al., Lect. Notes Comput. Sci. 10143, 291--308 (2017; Zbl 1404.94083) Full Text: DOI
Brakerski, Zvika; Rothblum, Guy N. Obfuscating conjunctions. (English) Zbl 1370.94491 J. Cryptology 30, No. 1, 289-320 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Z. Brakerski} and \textit{G. N. Rothblum}, J. Cryptology 30, No. 1, 289--320 (2017; Zbl 1370.94491) Full Text: DOI
Giacobazzi, Roberto; Mastroeni, Isabella; Dalla Preda, Mila Maximal incompleteness as obfuscation potency. (English) Zbl 1355.68053 Formal Asp. Comput. 29, No. 1, 3-31 (2017). MSC: 68N30 PDF BibTeX XML Cite \textit{R. Giacobazzi} et al., Formal Asp. Comput. 29, No. 1, 3--31 (2017; Zbl 1355.68053) Full Text: DOI
Cohen, Aloni; Holmgren, Justin; Nishimaki, Ryo; Vaikuntanathan, Vinod; Wichs, Daniel Watermarking cryptographic capabilities. (English) Zbl 1377.94046 Wichs, Daniel (ed.) et al., Proceedings of the 48th annual ACM SIGACT symposium on theory of computing, STOC ’16, Cambridge, MA, USA, June 19–21, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4132-5). 1115-1127 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Cohen} et al., in: Proceedings of the 48th annual ACM SIGACT symposium on theory of computing, STOC '16, Cambridge, MA, USA, June 19--21, 2016. New York, NY: Association for Computing Machinery (ACM). 1115--1127 (2016; Zbl 1377.94046) Full Text: DOI
Jia, Dingding; Lu, Xianhui; Li, Bao Receiver selective opening security from indistinguishability obfuscation. (English) Zbl 1394.94934 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49889-8/pbk; 978-3-319-49890-4/ebook). Lecture Notes in Computer Science 10095, 393-410 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Jia} et al., Lect. Notes Comput. Sci. 10095, 393--410 (2016; Zbl 1394.94934) Full Text: DOI
Arriaga, Afonso; Barbosa, Manuel; Farshim, Pooya Private functional encryption: indistinguishability-based definitions and constructions from obfuscation. (English) Zbl 1411.94047 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 227-247 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Arriaga} et al., Lect. Notes Comput. Sci. 10095, 227--247 (2016; Zbl 1411.94047) Full Text: DOI
Liu, Muhua; Wu, Ying; Xue, Rui Verifiable computation for randomized algorithm. (English) Zbl 1411.94073 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 99-118 (2016). MSC: 94A60 68P25 68W20 PDF BibTeX XML Cite \textit{M. Liu} et al., Lect. Notes Comput. Sci. 10095, 99--118 (2016; Zbl 1411.94073) Full Text: DOI
Asharov, Gilad; Segev, Gil Limits on the power of indistinguishability obfuscation and functional encryption. (English) Zbl 1356.94048 SIAM J. Comput. 45, No. 6, 2117-2176 (2016). MSC: 94A60 68P25 68Q17 PDF BibTeX XML Cite \textit{G. Asharov} and \textit{G. Segev}, SIAM J. Comput. 45, No. 6, 2117--2176 (2016; Zbl 1356.94048) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Paneth, Omer; Rosen, Alon On the existence of extractable one-way functions. (English) Zbl 1353.94039 SIAM J. Comput. 45, No. 5, 1910-1952 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., SIAM J. Comput. 45, No. 5, 1910--1952 (2016; Zbl 1353.94039) Full Text: DOI
Mittelbach, Arno; Venturi, Daniele Fiat-Shamir for highly sound protocols is instantiable. (English) Zbl 1416.94055 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 198-215 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Mittelbach} and \textit{D. Venturi}, Lect. Notes Comput. Sci. 9841, 198--215 (2016; Zbl 1416.94055) Full Text: DOI
Cohen, Ran; Peikert, Chris On adaptively secure multiparty computation with a short CRS. (English) Zbl 1400.94182 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 129-146 (2016). MSC: 94A62 68Q10 PDF BibTeX XML Cite \textit{R. Cohen} and \textit{C. Peikert}, Lect. Notes Comput. Sci. 9841, 129--146 (2016; Zbl 1400.94182) Full Text: DOI
Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof Offline witness encryption. (English) Zbl 1348.94029 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 285-303 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Abusalah} et al., Lect. Notes Comput. Sci. 9696, 285--303 (2016; Zbl 1348.94029) Full Text: DOI
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam Reusable fuzzy extractors for low-entropy distributions. (English) Zbl 1347.94022 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 117-146 (2016). MSC: 94A60 68P30 PDF BibTeX XML Cite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 9665, 117--146 (2016; Zbl 1347.94022) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent Candidate indistinguishability obfuscation and functional encryption for all circuits. (English) Zbl 1348.94048 SIAM J. Comput. 45, No. 3, 882-929 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Garg} et al., SIAM J. Comput. 45, No. 3, 882--929 (2016; Zbl 1348.94048) Full Text: DOI
Chen, Yu-Chi; Chow, Sherman S. M.; Chung, Kai-Min; Lai, Russell W. F.; Lin, Wei-Kai; Zhou, Hong-Sheng Cryptography for parallel RAM from indistinguishability obfuscation. (English) Zbl 1334.94068 Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 179-190 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Y.-C. Chen} et al., in: Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS'16, Cambridge, MA, USA, January 14--16, 2016. New York, NY: Association for Computing Machinery (ACM). 179--190 (2016; Zbl 1334.94068) Full Text: DOI
Canetti, Ran; Holmgren, Justin Fully succinct garbled RAM. (English) Zbl 1334.68064 Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 169-178 (2016). MSC: 68Q05 68N30 68Q10 94A60 PDF BibTeX XML Cite \textit{R. Canetti} and \textit{J. Holmgren}, in: Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS'16, Cambridge, MA, USA, January 14--16, 2016. New York, NY: Association for Computing Machinery (ACM). 169--178 (2016; Zbl 1334.68064) Full Text: DOI
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal Secure multiparty computation with general interaction patterns. (English) Zbl 1334.94081 Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 157-168 (2016). MSC: 94A60 68Q17 PDF BibTeX XML Cite \textit{S. Halevi} et al., in: Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS'16, Cambridge, MA, USA, January 14--16, 2016. New York, NY: Association for Computing Machinery (ACM). 157--168 (2016; Zbl 1334.94081) Full Text: DOI
Brakerski, Zvika; Vaikuntanathan, Vinod; Wee, Hoeteck; Wichs, Daniel Obfuscating conjunctions under entropic ring LWE. (English) Zbl 1334.94066 Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 147-156 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Z. Brakerski} et al., in: Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS'16, Cambridge, MA, USA, January 14--16, 2016. New York, NY: Association for Computing Machinery (ACM). 147--156 (2016; Zbl 1334.94066) Full Text: DOI
Beimel, Amos; Gabizon, Ariel; Ishai, Yuval; Kushilevitz, Eyal Distribution design. (English) Zbl 1334.94058 Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 81-92 (2016). MSC: 94A60 68Q87 94A62 PDF BibTeX XML Cite \textit{A. Beimel} et al., in: Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS'16, Cambridge, MA, USA, January 14--16, 2016. New York, NY: Association for Computing Machinery (ACM). 81--92 (2016; Zbl 1334.94058) Full Text: DOI
Albrecht, Martin R.; Farshim, Pooya; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1388.94030 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 446-473 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 9562, 446--473 (2016; Zbl 1388.94030) Full Text: DOI
Mahmoody, Mohammad; Mohammed, Ameer; Nematihaji, Soheil; Pass, Rafael; Shelat, Abhi Lower bounds on assumptions behind indistinguishability obfuscation. (English) Zbl 1388.94072 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 49-66 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 9562, 49--66 (2016; Zbl 1388.94072) Full Text: DOI
Mahmoody, Mohammad; Mohammed, Ameer; Nematihaji, Soheil On the impossibility of virtual black-box obfuscation in idealized models. (English) Zbl 1388.94071 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 18-48 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 9562, 18--48 (2016; Zbl 1388.94071) Full Text: DOI
Pass, Rafael; Shelat, Abhi Impossibility of VBB obfuscation with ideal constant-degree graded encodings. (English) Zbl 1388.94075 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 3-17 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Pass} and \textit{A. Shelat}, Lect. Notes Comput. Sci. 9562, 3--17 (2016; Zbl 1388.94075) Full Text: DOI
Liang, Bei; Li, Hongda; Chang, Jinyong The generic transformation from standard signatures to identity-based aggregate signatures. (English) Zbl 1397.94085 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 21-41 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{B. Liang} et al., Lect. Notes Comput. Sci. 9290, 21--41 (2015; Zbl 1397.94085) Full Text: DOI
Hubáček, Pavel; Wichs, Daniel On the communication complexity of secure function evaluation with long output. (English) Zbl 1364.68201 Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 163-172 (2015). MSC: 68Q05 68Q10 68Q17 94A60 PDF BibTeX XML Cite \textit{P. Hubáček} and \textit{D. Wichs}, in: Proceedings of the 6th conference on innovations in theoretical computer science, ITCS'15, Rehovot, Israel, January 11--13, 2015. New York, NY: Association for Computing Machinery (ACM). 163--172 (2015; Zbl 1364.68201) Full Text: DOI
Xu, Jing; Hu, Xue-Xian; Zhang, Zhen-Feng Round-optimal password-based group key exchange protocols in the standard model. (English) Zbl 06553577 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). Lecture Notes in Computer Science 9092, 42-61 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{J. Xu} et al., Lect. Notes Comput. Sci. 9092, 42--61 (2015; Zbl 06553577) Full Text: DOI
Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav Functional signcryption: notion, construction, and applications. (English) Zbl 1388.94045 Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 268-288 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 9451, 268--288 (2015; Zbl 1388.94045) Full Text: DOI
Liang, Bei; Li, Hongda; Chang, Jinyong Constrained verifiable random functions from indistinguishability obfuscation. (English) Zbl 1388.94069 Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 43-60 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Liang} et al., Lect. Notes Comput. Sci. 9451, 43--60 (2015; Zbl 1388.94069) Full Text: DOI
Tang, Fei; Li, Hongda Ring signatures of constant size without random oracles. (English) Zbl 1400.94173 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 93-108 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{F. Tang} and \textit{H. Li}, Lect. Notes Comput. Sci. 8957, 93--108 (2015; Zbl 1400.94173) Full Text: DOI
Swanson, Colleen M.; Stinson, Douglas R. Extended results on privacy against coalitions of users in user-private information retrieval protocols. (English) Zbl 1341.68042 Cryptogr. Commun. 7, No. 4, 415-437 (2015). MSC: 68P20 05B05 94A60 94A62 PDF BibTeX XML Cite \textit{C. M. Swanson} and \textit{D. R. Stinson}, Cryptogr. Commun. 7, No. 4, 415--437 (2015; Zbl 1341.68042) Full Text: DOI
Bitansky, Nir; Paneth, Omer On non-black-box simulation and the impossibility of approximate obfuscation. (English) Zbl 1380.94075 SIAM J. Comput. 44, No. 5, 1325-1383 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} and \textit{O. Paneth}, SIAM J. Comput. 44, No. 5, 1325--1383 (2015; Zbl 1380.94075) Full Text: DOI
Bernstein, Daniel J.; Hülsing, Andreas; Lange, Tanja; Niederhagen, Ruben Bad directions in cryptographic hash functions. (English) Zbl 1391.94729 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 488-508 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{D. J. Bernstein} et al., Lect. Notes Comput. Sci. 9144, 488--508 (2015; Zbl 1391.94729) Full Text: DOI
Nishimaki, Ryo; Xagawa, Keita Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES. (English) Zbl 1347.94053 Des. Codes Cryptography 77, No. 1, 61-98 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Nishimaki} and \textit{K. Xagawa}, Des. Codes Cryptography 77, No. 1, 61--98 (2015; Zbl 1347.94053) Full Text: DOI
Ding, Ning On zero-knowledge with strict polynomial-time simulation and extraction from differing-input obfuscation for circuits. (English) Zbl 1336.94043 Lehmann, Anja (ed.) et al., Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2–5, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17469-3/pbk; 978-3-319-17470-9/ebook). Lecture Notes in Computer Science 9063, 51-68 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Ding}, Lect. Notes Comput. Sci. 9063, 51--68 (2015; Zbl 1336.94043) Full Text: DOI
Nasim, Faisal; Aslam, Baber; Ahmed, Waseem; Naeem, Talha Uncovering self code modification in Android. (English) Zbl 06483827 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 297-313 (2015). MSC: 68P25 68P30 PDF BibTeX XML Cite \textit{F. Nasim} et al., Lect. Notes Comput. Sci. 9084, 297--313 (2015; Zbl 06483827) Full Text: DOI
Iovino, Vincenzo; Żebroski, Karol Simulation-based secure functional encryption in the random oracle model. (English) Zbl 1370.94518 Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 21-39 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Iovino} and \textit{K. Żebroski}, Lect. Notes Comput. Sci. 9230, 21--39 (2015; Zbl 1370.94518) Full Text: DOI