搜索结果: 91-105 共查到“军事学 obfuscation”相关记录157条 . 查询时间(0.109 秒)
This paper studies the question of how to define, construct, and use obfuscators for
probabilistic programs. Such obfuscators compile a possibly randomized program into a
deterministic one, which ac...
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Turing Machines Unbounded Memory
2016/1/6
We show how to build indistinguishability obfuscation (iO) for Turing Machines where the overhead
is polynomial in the security parameter λ, machine description |M| and input size |x| (with only a
n...
Public-Coin Differing-Inputs Obfuscation and Its Applications
Program Obfuscation Differing Inputs Obfuscation Functional Encryption
2016/1/5
Differing inputs obfuscation (diO) is a strengthening of indistinguishability obfuscation (iO) that
has recently found applications to improving the efficiency and generality of obfuscation, function...
Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
Concurrent ZK Constant-Round Indistinguishability Obfuscation
2016/1/5
We present a constant-round concurrent zero-knowledge protocol for NP. Our protocol
relies on the existence of families of collision-resistant hash functions, one-way permutations,
and indistinguish...
Assuming trapdoor permutations, we show that there exist function families that cannot be VBB-obfuscated even if both the obfuscator and the obfuscated program have access to a random oracle. Specific...
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
self-bilinear map indistinguishability obfuscation multilinear map
2016/1/4
A self-bilinear map is a bilinear map where the domain and target groups are identical. In
this paper, we introduce a self-bilinear map with auxiliary information which is a weaker variant
of a self...
Indistinguishability Obfuscation from Functional Encryption
obfuscation functional encryption
2016/1/3
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. So far, candidate IO constructions were based on specific assumptio...
Post-Zeroizing Obfuscation: The case of Evasive Circuits
Obfuscation zeroizing attacks evasive functions
2016/1/3
Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted signifi-
cant gaps in our intuition about security in candidate multilinear map schemes, and in candidate
obfusc...
Indistinguishability Obfuscation from Compact Functional Encryption
program obfuscation functional encryption
2016/1/3
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic landscape
by enabling several security goals that were previously beyond our reach. Consequently,
one of the pr...
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
verifiably encrypted signature obfuscation encrypted verifi- ably encrypted signature
2016/1/3
Verifiably encrypted signatures (VES) are signatures encrypted
by a public key of a trusted third party and we can verify their validity
without decryption. This paper proposes a new VES scheme whic...
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
security assumptions functional encryption scheme
2015/12/31
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a
“central hub” for almost all known cryptographic tasks, and as an extremely powerful building
block for new...
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
obfuscation zero-knowledge resettable-security
2015/12/31
The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. Barak's technique ha...
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
VBB obfuscation graded encodings
2015/12/31
A celebrated result by Barak et al (JACM’12) shows the impossibility
of general-purpose virtual black-box (VBB) obfuscation in the
plain model. A recent work by Canetti, Kalai, and Paneth (TCC’15)
...
Computation-Trace Indistinguishability Obfuscation and its Applications
computation-trace indistinguishability obfuscation indistinguishability obfuscation computation trace
2015/12/31
We introduce a new, instance-based notion of indistinguishability obfuscation, called computation-trace
indistinguishability obfuscation (CiO), for (parallel) RAM computation. CiO only obfuscates a f...
Survey on Cryptographic Obfuscation
Secure Computation General Purpose Obfuscation Indistinguishability Obfuscation
2015/12/31
The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic
attitude towards general purpose cryptographic obfuscation. Since their first
candidate construction, several authors ...