搜索结果: 16-30 共查到“军事学 obfuscation”相关记录157条 . 查询时间(0.054 秒)
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation
indistinguishability obfuscation functional encryption bootstrapping
2018/6/27
In a recent work, Lin and Tessaro [LT17] (LT) show that iO may be constructed using i) Functional Encryption (FE) for polynomials of degree LL , ii) Pseudorandom Generators (PRG) with blockwise locali...
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness
Indistinguishability Obfuscation Functional Encryption
2018/6/25
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, significantly expanding the scope of problems amenable to cryptographic study. All known approaches to cons...
Simpler Constructions of Asymmetric Primitives from Obfuscation
obfuscation public-key encryption identity-based encryption
2018/6/7
We revisit constructions of asymmetric primitives from obfuscation and give simpler alternatives. We consider public-key encryption, (hierarchical) identity-based encryption ((H)IBE), and predicate en...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to its far reaching applications in cryptography and other fields. However, to date, obtaining a plaus...
Limitation of the HHSS Obfuscation: Lattice based Distinguishing Attack
Cryptanalysis Indistinguishability Obfuscation Matrix Branching Program
2018/5/3
Indistinguishability Obfuscation (iOiO) is a hopeful tool which obfuscates a program with the least leakage, and produces various applications including functional encryption. Recently, a state-of-the...
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation
point obfuscation non-malleability virtual black-box
2018/3/7
The random oracle paradigm allows us to analyze the security of protocols and construction in an idealized model, where all parties have access to a truly random function. This is one of the most succ...
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
obfuscation generic group virtual black box
2018/3/5
We give a simple and efficient method for obfuscating pattern matching with wildcards. In other words, we construct a way to check an input against a secret pattern, which is described in terms of pre...
Interactively Secure Groups from Obfuscation
indistinguishability obfuscation Uber assumption
2018/1/12
We construct a mathematical group in which an interactive variant of the very general Uber assumption holds. Our construction uses probabilistic indistinguishability obfuscation, fully homomorphic enc...
Graded Encoding Schemes from Obfuscation
Multilinear maps graded encoding schemes indistinguishability obfuscation
2018/1/12
We construct a graded encoding scheme (GES), an approximate form of graded multilinear maps. Our construction relies on indistinguishability obfuscation, and a pairing-friendly group in which (a suita...
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
cyclic circuit logic encryption circuit obfuscation
2017/12/11
The high cost of IC design has made chip protection one of the first priorities of the semiconductor industry. Although there is a common impression that combinational circuits must be designed withou...
Recently, Albrecht, Davidson, Larraia, and Pellet-Mary constructed a variant of the GGH13 without ideals and presented the distinguishing attacks in simplified branching program and obfuscation securi...
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Signature scheme indistinguishability obfuscation puncturable pseudo-random functions
2017/10/9
Indistinguishability obfuscation (iO) is a powerful cryptographic tool often employed to construct a variety of core cryptographic primitives such as public key encryption and signatures. In this pape...
When does Functional Encryption Imply Obfuscation?
Blackbox separations Functional Encryption Indistinguishability Obfuscation
2017/9/28
Realizing indistinguishablility obfuscation (IO) based on well-understood computational assumptions is an important open problem. Recently, realizing functional encryption (FE) has emerged as promisin...
Implementing Conjunction Obfuscation under Entropic Ring LWE
lattice techniques program obfuscation conjunction
2017/9/7
We address the practicality challenges of secure program obfuscation by developing, implementing and experimentally assessing an approach to securely obfuscate conjunction programs in software. Conjun...
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
obfuscation multi-input functional encryption
2017/9/1
Program obfuscation is a powerful security primitive with many applications. White-box cryptography studies a particular subset of program obfuscation targeting keyed pseudorandom functions (PRFs), a ...