Campanelli, Matteo; Francati, Danilo; Orlandi, Claudio Structure-preserving compilers from new notions of obfuscations. (English) Zbl 07766997 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 663-693 (2023). MSC: 68N20 68Pxx 94A60 PDFBibTeX XMLCite \textit{M. Campanelli} et al., Lect. Notes Comput. Sci. 13941, 663--693 (2023; Zbl 07766997) Full Text: DOI
Murphy, Alice; O’Neill, Adam; Zaheri, Mohammad Instantiability of classical random-oracle-model encryption transforms. (English) Zbl 1519.94178 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 323-352 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Murphy} et al., Lect. Notes Comput. Sci. 13794, 323--352 (2023; Zbl 1519.94178) Full Text: DOI
Chen, Yu; Qin, Baodong; Zhang, Jiang; Deng, Yi; Chow, Sherman S. M. Non-malleable functions and their applications. (English) Zbl 1486.94086 J. Cryptology 35, No. 2, Paper No. 11, 41 p. (2022). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Chen} et al., J. Cryptology 35, No. 2, Paper No. 11, 41 p. (2022; Zbl 1486.94086) Full Text: DOI
Liu, Qipeng; Zhandry, Mark Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness. (English) Zbl 1470.94095 J. Cryptology 34, No. 3, Paper No. 35, 53 p. (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Q. Liu} and \textit{M. Zhandry}, J. Cryptology 34, No. 3, Paper No. 35, 53 p. (2021; Zbl 1470.94095) Full Text: DOI
Aviram, Nimrod; Gellert, Kai; Jager, Tibor Session resumption protocols and efficient forward security for TLS 1.3 0-RTT. (English) Zbl 1469.94088 J. Cryptology 34, No. 3, Paper No. 20, 57 p. (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{N. Aviram} et al., J. Cryptology 34, No. 3, Paper No. 20, 57 p. (2021; Zbl 1469.94088) Full Text: DOI
Zhandry, Mark The magic of ELFs. (English) Zbl 1466.94040 J. Cryptology 32, No. 3, 825-866 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Zhandry}, J. Cryptology 32, No. 3, 825--866 (2019; Zbl 1466.94040) Full Text: DOI Link
Komargodski, Ilan Leakage resilient one-way functions: the auxiliary-input setting. (English) Zbl 1408.94942 Theor. Comput. Sci. 746, 6-18 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Komargodski}, Theor. Comput. Sci. 746, 6--18 (2018; Zbl 1408.94942) Full Text: DOI
Asharov, Gilad; Segev, Gil On constructing one-way permutations from indistinguishability obfuscation. (English) Zbl 1400.94112 J. Cryptology 31, No. 3, 698-736 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Asharov} and \textit{G. Segev}, J. Cryptology 31, No. 3, 698--736 (2018; Zbl 1400.94112) Full Text: DOI
Mittelbach, Arno; Venturi, Daniele Fiat-Shamir for highly sound protocols is instantiable. (English) Zbl 1408.94953 Theor. Comput. Sci. 740, 28-62 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Mittelbach} and \textit{D. Venturi}, Theor. Comput. Sci. 740, 28--62 (2018; Zbl 1408.94953) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. (English) Zbl 1405.94064 Algorithmica 79, No. 4, 1353-1373 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Garg} et al., Algorithmica 79, No. 4, 1353--1373 (2017; Zbl 1405.94064) Full Text: DOI
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele Predictable arguments of knowledge. (English) Zbl 1404.94067 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 121-150 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Faonio} et al., Lect. Notes Comput. Sci. 10174, 121--150 (2017; Zbl 1404.94067) Full Text: DOI Link
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan Better two-round adaptive multi-party computation. (English) Zbl 1400.94130 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 396-427 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 10175, 396--427 (2017; Zbl 1400.94130) Full Text: DOI
Zhao, Yongjun; Chow, Sherman S. M. Towards proofs of ownership beyond bounded leakage. (English) Zbl 1381.94111 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 340-350 (2016). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{Y. Zhao} and \textit{S. S. M. Chow}, Lect. Notes Comput. Sci. 10005, 340--350 (2016; Zbl 1381.94111) Full Text: DOI
Arriaga, Afonso; Barbosa, Manuel; Farshim, Pooya Private functional encryption: indistinguishability-based definitions and constructions from obfuscation. (English) Zbl 1411.94047 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 227-247 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Arriaga} et al., Lect. Notes Comput. Sci. 10095, 227--247 (2016; Zbl 1411.94047) Full Text: DOI Link
Komargodski, Ilan Leakage resilient one-way functions: the auxiliary-input setting. (English) Zbl 1369.94547 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 139-158 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Komargodski}, Lect. Notes Comput. Sci. 9985, 139--158 (2016; Zbl 1369.94547) Full Text: DOI
Asharov, Gilad; Segev, Gil Limits on the power of indistinguishability obfuscation and functional encryption. (English) Zbl 1356.94048 SIAM J. Comput. 45, No. 6, 2117-2176 (2016). MSC: 94A60 68P25 68Q17 PDFBibTeX XMLCite \textit{G. Asharov} and \textit{G. Segev}, SIAM J. Comput. 45, No. 6, 2117--2176 (2016; Zbl 1356.94048) Full Text: DOI
Zhandry, Mark The magic of ELFs. (English) Zbl 1384.94112 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 479-508 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Zhandry}, Lect. Notes Comput. Sci. 9814, 479--508 (2016; Zbl 1384.94112) Full Text: DOI HAL
Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke Signatures resilient to uninvertible leakage. (English) Zbl 1482.94073 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 372-390 (2016). MSC: 94A62 68M25 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 9841, 372--390 (2016; Zbl 1482.94073) Full Text: DOI
Bellare, Mihir; Stepanovs, Igors Point-function obfuscation: a framework and generic constructions. (English) Zbl 1382.94061 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 565-594 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} and \textit{I. Stepanovs}, Lect. Notes Comput. Sci. 9563, 565--594 (2016; Zbl 1382.94061) Full Text: DOI
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano Contention in cryptoland: obfuscation, leakage and UCE. (English) Zbl 1382.94062 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 542-564 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 9563, 542--564 (2016; Zbl 1382.94062) Full Text: DOI
Asharov, Gilad; Segev, Gil On constructing one-way permutations from indistinguishability obfuscation. (English) Zbl 1382.94051 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 512-541 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Asharov} and \textit{G. Segev}, Lect. Notes Comput. Sci. 9563, 512--541 (2016; Zbl 1382.94051) Full Text: DOI
Zhandry, Mark How to avoid obfuscation using witness PRFs. (English) Zbl 1382.94170 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 421-448 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Zhandry}, Lect. Notes Comput. Sci. 9563, 421--448 (2016; Zbl 1382.94170) Full Text: DOI
Canetti, Ran; Chen, Yilei; Reyzin, Leonid On the correlation intractability of obfuscated pseudorandom functions. (English) Zbl 1388.94038 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 389-415 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 9562, 389--415 (2016; Zbl 1388.94038) Full Text: DOI