搜索结果: 46-51 共查到“军事学 Indistinguishability Obfuscation”相关记录51条 . 查询时间(0.015 秒)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
obfuscation multi-party key exchange,
2014/3/7
In this work, we show how to use indistinguishability obfuscation (iO) to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several intere...
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation
Indistinguishability Obfuscation Full Domain Hash
2014/3/10
Our main result gives a way to instantiate the random oracle with a concrete hash function in ``full domain hash'' applications. The term full domain hash was first proposed by Bellare and Rogaway and...
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
indistinguishability obfuscation knowledge of exponent
2014/3/7
We show that if there exist indistinguishability obfuscators for all circuits then there do not exist auxiliary-input extractable one-way functions. In particular, the knowledge of exponent assumption...
We show that if $\NP \neq co-RP$ then the existence of efficient indistinguishability obfuscation (\iO) implies the existence of one-way functions. Thus, if we live in ``Pessiland", where $\NP$ proble...
Two-round secure MPC from Indistinguishability Obfuscation
Multilinear Maps Indistinguishability Obfuscation
2014/3/7
One fundamental complexity measure of an MPC protocol is its {\em round complexity}. Asharov et al. recently constructed the first three-round protocol for general MPC in the CRS model. Here, we show ...
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Obfuscation Functional Encryption
2014/3/11
In this work, we study indistinguishability obfuscation and functional encryption for general circuits:
Indistinguishability obfuscation requires that given any two equivalent circuits C_0 and C_1 of...