搜索结果: 136-150 共查到“军事学 obfuscation”相关记录157条 . 查询时间(0.701 秒)
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
indistinguishability obfuscation knowledge of exponent
2014/3/7
We show that if there exist indistinguishability obfuscators for all circuits then there do not exist auxiliary-input extractable one-way functions. In particular, the knowledge of exponent assumption...
We show that if $\NP \neq co-RP$ then the existence of efficient indistinguishability obfuscation (\iO) implies the existence of one-way functions. Thus, if we live in ``Pessiland", where $\NP$ proble...
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
secret-key cryptography Obfuscation
2014/3/10
We present a new general-purpose obfuscator for all polynomial-size circuits. The obfuscator uses graded encoding schemes, a generalization of multilinear maps. We prove that the obfuscator exposes no...
Two-round secure MPC from Indistinguishability Obfuscation
Multilinear Maps Indistinguishability Obfuscation
2014/3/7
One fundamental complexity measure of an MPC protocol is its {\em round complexity}. Asharov et al. recently constructed the first three-round protocol for general MPC in the CRS model. Here, we show ...
We show how to securely obfuscate a new class of functions: {\em conjunctions of $NC0_d$ circuits}. These are functions of the form $C(x) = \bigwedge_{i=1}^m C_i(x)$, where each $C_i$ is a boolean $NC...
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Obfuscation Functional Encryption
2014/3/11
In this work, we study indistinguishability obfuscation and functional encryption for general circuits:
Indistinguishability obfuscation requires that given any two equivalent circuits C_0 and C_1 of...
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
foundations / obfuscation resettable protocols non-black-box zero-knowledge
2013/2/21
The traditional notion of {\em program obfuscation} requires that an obfuscation $\tilde{f}$ of a program $f$ computes the exact same function as $f$, but beyond that, the code of $\tilde{f}$ should n...
We consider general program obfuscation mechanisms using ``somewhat trusted'' hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifica...
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Obfuscation Stateless Tamper-Proof hardware Universal Composability
2012/6/14
Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obf...
We consider general program obfuscation mechanisms using ``somewhat trusted'' hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifica...
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Obfuscation Stateless Tamper-Proof hardware Universal Composability Universal Arguments Fully-Homomorphic-Encryption
2012/3/20
Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obf...
From Point Obfuscation To 3-round Zero-Knowledge
cryptographic protocols / Zero-Knowledge Obfuscation Point Obfuscation Witness-Hiding
2012/3/26
We construct 3-round proofs and arguments with negligible soundness error satisfying two relaxed notions of {\em zero-knowledge}: {\em Weak ZK} and {\em witness hiding} (WH). At the heart of our const...
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Obfuscation Stateless Tamper-Proof hardware
2012/8/28
Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obf...
Collusion Resistant Obfuscation and Functional Re-encryption
program obfuscation auxiliary input security functional re-encryption
2011/7/25
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary.
Collusion Resistant Obfuscation and Functional Re-encryption
public-key cryptography / re-encryption obfuscation
2012/3/27
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Despite its immense cryp...