搜索结果: 106-120 共查到“军事学 obfuscation”相关记录157条 . 查询时间(0.067 秒)
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Physical Uncloanble Function obfuscation
2015/12/30
Physical Unclonable Functions (PUFs), as novel lightweight
hardware security primitives, provide a higher level security with lower
power and area overhead in comparison with traditional cryptograph...
Contention in Cryptoland: Obfuscation, Leakage and UCE
impossibility results assumptions obfuscation
2015/12/30
This paper addresses the fundamental question of whether or not different, exciting primitives now being considered actually exist. We show that we, unfortunately, cannot have them all. We provide res...
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
re-encryption average-case obfuscation
2015/12/30
In this work we define multiple relaxations to the definition of
correctness in secure obfuscation. While still remaining meaningful, these
relaxations provide ways to obfuscate many primitives in a...
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
Universal computational extractors standard model superfluous padding assumption
2015/12/29
Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi
(CRYPTO 2013), are a framework of assumptions on hash functions that allow to instantiate random
oracles in a l...
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
Indistinguishability obfuscation Oblivious transfer
2015/12/29
We proposed a new secure oblivious transfer protocol from
indistinguishability obfuscation in this paper. Our main technical tool
is the candidate indistinguishability obfuscation introduced in [1] ...
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Virtual Black-Box Obfuscation Idealized Models
2015/12/29
The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual blackbox
(VBB) obfuscation for general circuits. The recent work of Canetti, Kalai, and Paneth
(TCC’15) extended ...
Point-Function Obfuscation: A Framework and Generic Constructions
point-function obfuscation indistinguishability obfuscation one-way functions
2015/12/25
We give a definitional framework for point-function obfuscation in which security is parameterized
by a class of algorithms we call target generators. Existing and new notions are captured
and expla...
Indistinguishability Obfuscation: from Approximate to Exact
Functional Encryption Program Obfuscation Secure Function Evaluation
2015/12/24
We show general transformations from subexponentially-secure approximate indistinguishability
obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 +
fraction of ...
Indistinguishability Obfuscation from Functional Encryption for Simple Functions
Functional Encryption Simple Functions
2015/12/24
We show how to construct indistinguishability obfuscation (iO) for circuits from any
non-compact functional encryption (FE) scheme with sub-exponential security against unbounded
collusions. We acco...
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Encoding System ndistinguishability Obfuscation
2015/12/24
The bilinear map whose domain and target sets are identical is called the self-bilinear map. Original self-bilinear maps are defined over cyclic groups. This brings a lot of limitations to construct s...
Multilinear Maps from Obfuscation
Multilinear map indistinguishability obfuscation homomorphic encryption
2015/12/24
We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known results on the const...
Garg et al. [FOCS 2013] showed how to construct indistinguishability obfuscation (iO) from a restriction of cryptographic multilinear maps called Multilinear Jigsaw Puzzles. Since then, a number of ot...
Algorithmic Information Theory for Obfuscation Security
Code Obfuscation Kolmogorov Complexity Intellectual Property Protection
2015/12/24
The main problem in designing effective code obfuscation is to guarantee security. State of the art obfuscation
techniques rely on an unproven concept of security, and therefore are not regarded as p...
Recent advances in program obfuscation suggest that it is possible to create software that
can provably safeguard secret information. However, software systems usually contain large
executable code ...
Indistinguishability Obfuscation with Constant Size Overhead
Indistinguishability Obfuscation Constant Size Overhead
2015/12/22
Present constructions of indistinguishability obfuscation (iO) create obfuscated programs
where the size of the obfuscated program is at least a factor of a security parameter larger
than the size o...