Sciweavers

TCC
2016
Springer
40views Cryptology» more  TCC 2016»
10 years 16 days ago
Functional Encryption Without Obfuscation
Previously known functional encryption (FE) schemes for general circuits relied on indistinguishability obfuscation, which in turn either relies on an exponential number of assump...
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhand...
TCC
2016
Springer
59views Cryptology» more  TCC 2016»
10 years 16 days ago
Indistinguishability Obfuscation: From Approximate to Exact
We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1...
Nir Bitansky, Vinod Vaikuntanathan
TCC
2016
Springer
46views Cryptology» more  TCC 2016»
10 years 16 days ago
Output-Compressing Randomized Encodings and Applications
We consider randomized encodings (RE) that enable encoding a Turing machine Π and input x into its “randomized encoding” ˆΠ(x) in sublinear, or even polylogarithmic, time i...
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telan...
TCC
2016
Springer
39views Cryptology» more  TCC 2016»
10 years 16 days ago
Optimal Computational Split-state Non-malleable Codes
Abstract. Non-malleable codes are a generalization of classical errorcorrecting codes where the act of “corrupting” a codeword is replaced by a “tampering” adversary. Non-m...
Divesh Aggarwal, Shashank Agrawal, Divya Gupta 000...
TCC
2016
Springer
54views Cryptology» more  TCC 2016»
10 years 16 days ago
Characterization of Secure Multiparty Computation Without Broadcast
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work ...
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem