Pad-net: Multi-tasks guided prediction-and-distillation network for simultaneous depth estimation and scene parsing

D Xu, W Ouyang, X Wang… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
Depth estimation and scene parsing are two particularly important tasks in visual scene
understanding. In this paper we tackle the problem of simultaneous depth estimation and …

Candidate indistinguishability obfuscation and functional encryption for all circuits

S Garg, C Gentry, S Halevi, M Raykova, A Sahai… - SIAM Journal on …, 2016 - SIAM
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …

Fully secure functional encryption for inner products, from standard assumptions

S Agrawal, B Libert, D Stehlé - Annual International Cryptology …, 2016 - Springer
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …

Multi-input functional encryption

S Goldwasser, SD Gordon, V Goyal, A Jain… - Advances in Cryptology …, 2014 - Springer
We introduce the problem of Multi-Input Functional Encryption, where a secret key sk f can
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …

Indistinguishability obfuscation from functional encryption

N Bitansky, V Vaikuntanathan - Journal of the ACM (JACM), 2018 - dl.acm.org
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …

Indistinguishability obfuscation from compact functional encryption

P Ananth, A Jain - Annual Cryptology Conference, 2015 - Springer
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …

Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation

D Boneh, K Lewi, M Raykova, A Sahai… - … Conference on the …, 2015 - Springer
Deciding “greater-than” relations among data items just given their encryptions is at the
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …

Function-hiding inner product encryption

A Bishop, A Jain, L Kowalczyk - … Conference on the Theory and Application …, 2015 - Springer
We extend the reach of functional encryption schemes that are provably secure under
simple assumptions against unbounded collusion to include function-hiding inner product …

A punctured programming approach to adaptively secure functional encryption

B Waters - Annual Cryptology Conference, 2015 - Springer
We propose the first construction for achieving adaptively secure functional encryption (FE)
for poly-sized circuits (without complexity leveraging) from indistinguishability obfuscation (i …

Indistinguishability obfuscation from trilinear maps and block-wise local PRGs

H Lin, S Tessaro - Annual International Cryptology Conference, 2017 - Springer
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …