Sciweavers

Share
20 search results - page 2 / 4
» Multilinear Maps from Obfuscation
Sort
View
IACR
2016
41views Biometrics» more  IACR 2016»
3 years 5 months ago
Obfuscation without Multilinear Maps
Known methods for obfuscating a circuit need to represent the circuit as a branching program and then use a multilinear map to encrypt the branching program. Multilinear maps are,...
Dingfeng Ye, Peng Liu
TCC
2016
Springer
40views Cryptology» more  TCC 2016»
3 years 5 months ago
Functional Encryption Without Obfuscation
Previously known functional encryption (FE) schemes for general circuits relied on indistinguishability obfuscation, which in turn either relies on an exponential number of assump...
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhand...
TCC
2016
Springer
48views Cryptology» more  TCC 2016»
3 years 5 months ago
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
Since the seminal work of Garg et al. (FOCS’13) in which they proposed the first candidate construction for indistinguishability obfuscation (iO for short), iO has become a cent...
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematiha...
EUROCRYPT
2013
Springer
5 years 4 months ago
Candidate Multilinear Maps from Ideal Lattices
We describe plausible lattice-based constructions with properties that approximate the soughtafter multilinear maps in hard-discrete-logarithm groups, and show an example applicat...
Sanjam Garg, Craig Gentry, Shai Halevi
IJISEC
2016
49views more  IJISEC 2016»
3 years 5 months ago
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature ha...
Yu Chen, Qiong Huang, Zongyang Zhang
books