Reingold, Omer; Rothblum, Guy N.; Rothblum, Ron D. Constant-round interactive proofs for delegating computation. (English) Zbl 1464.68128 SIAM J. Comput. 50, No. 3, STOC16-255-STOC16-340 (2021). MSC: 68Q25 68Q10 68Q17 PDFBibTeX XMLCite \textit{O. Reingold} et al., SIAM J. Comput. 50, No. 3, STOC16--255-STOC16--340 (2021; Zbl 1464.68128) Full Text: DOI
Naor, Moni; Paneth, Omer; Rothblum, Guy N. Incrementally verifiable computation via incremental PCPs. (English) Zbl 1452.68079 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11892, 552-576 (2019). MSC: 68Q10 68Q15 94A60 PDFBibTeX XMLCite \textit{M. Naor} et al., Lect. Notes Comput. Sci. 11892, 552--576 (2019; Zbl 1452.68079) Full Text: DOI
Brakerski, Zvika; Rothblum, Guy N. Obfuscating conjunctions. (English) Zbl 1370.94491 J. Cryptology 30, No. 1, 289-320 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} and \textit{G. N. Rothblum}, J. Cryptology 30, No. 1, 289--320 (2017; Zbl 1370.94491) Full Text: DOI
Dwork, Cynthia; Naor, Moni; Rothblum, Guy N. Spooky interaction and its discontents: compilers for succinct two-message argument systems. (English) Zbl 1406.94049 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 123-145 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Dwork} et al., Lect. Notes Comput. Sci. 9816, 123--145 (2016; Zbl 1406.94049) Full Text: DOI
Goldwasser, Shafi; Rothblum, Guy N. How to compute in the presence of leakage. (English) Zbl 1353.94049 SIAM J. Comput. 44, No. 5, 1480-1549 (2015). MSC: 94A60 68P25 68Q17 PDFBibTeX XMLCite \textit{S. Goldwasser} and \textit{G. N. Rothblum}, SIAM J. Comput. 44, No. 5, 1480--1549 (2015; Zbl 1353.94049) Full Text: DOI Link
Goldwasser, Shafi; Rothblum, Guy N. On best-possible obfuscation. (English) Zbl 1302.94048 J. Cryptology 27, No. 3, 480-505 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Goldwasser} and \textit{G. N. Rothblum}, J. Cryptology 27, No. 3, 480--505 (2014; Zbl 1302.94048) Full Text: DOI Link
Canetti, Ran; Riva, Ben; Rothblum, Guy N. Refereed delegation of computation. (English) Zbl 1290.68013 Inf. Comput. 226, 16-36 (2013). MSC: 68M12 91A80 PDFBibTeX XMLCite \textit{R. Canetti} et al., Inf. Comput. 226, 16--36 (2013; Zbl 1290.68013) Full Text: DOI
Hohenberger, Susan; Rothblum, Guy N.; Shelat, Abhi; Vaikuntanathan, Vinod Securely obfuscating re-encryption. (English) Zbl 1251.94031 J. Cryptology 24, No. 4, 694-719 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., J. Cryptology 24, No. 4, 694--719 (2011; Zbl 1251.94031) Full Text: DOI
Canetti, Ran; Rothblum, Guy N.; Varia, Mayank Obfuscation of hyperplane membership. (English) Zbl 1274.94047 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 72-89 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 5978, 72--89 (2010; Zbl 1274.94047) Full Text: DOI