Indistinguishability obfuscation from functional encryption

N Bitansky, V Vaikuntanathan - Journal of the ACM (JACM), 2018 - dl.acm.org
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …

Registered (inner-product) functional encryption

D Francati, D Friolo, M Maitra, G Malavolta… - … Conference on the …, 2023 - Springer
Registered encryption (Garg et al., TCC'18) is an emerging paradigm that tackles the key-
escrow problem associated with identity-based encryption by replacing the private-key …

Indistinguishability obfuscation from trilinear maps and block-wise local PRGs

H Lin, S Tessaro - Annual International Cryptology Conference, 2017 - Springer
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …

Revisiting the cryptographic hardness of finding a nash equilibrium

S Garg, O Pandey, A Srinivasan - Annual International Cryptology …, 2016 - Springer
The exact hardness of computing a Nash equilibrium is a fundamental open question in
algorithmic game theory. This problem is complete for the complexity class PPAD. It is well …

Distinguisher-dependent simulation in two rounds and its applications

A Jain, YT Kalai, D Khurana, R Rothblum - Annual International …, 2017 - Springer
We devise a novel simulation technique that makes black-box use of the adversary as well
as the distinguisher. Using this technique we construct several round-optimal protocols …

Registered FE beyond predicates:(attribute-based) linear functions and more

P Datta, T Pal, S Yamada - International Conference on the Theory and …, 2025 - Springer
This paper introduces the first registered functional encryption RFE scheme tailored for
linear functions. Distinctly different from classical functional encryption (FE), RFE addresses …

Deniable fully homomorphic encryption from learning with errors

S Agrawal, S Goldwasser, S Mossel - … 2021, Virtual Event, August 16–20 …, 2021 - Springer
We define and construct Deniable Fully Homomorphic Encryption based on the Learning
With Errors (LWE) polynomial hardness assumption. Deniable FHE enables storing …

From cryptomania to obfustopia through secret-key functional encryption

N Bitansky, R Nishimaki, A Passelegue, D Wichs - Journal of Cryptology, 2020 - Springer
Functional encryption lies at the frontiers of the current research in cryptography; some
variants have been shown sufficiently powerful to yield indistinguishability obfuscation (IO) …

Indistinguishability obfuscation via mathematical proofs of equivalence

A Jain, Z ** - 2022 IEEE 63rd Annual Symposium on …, 2022 - ieeexplore.ieee.org
Over the last decade, indistinguishability obfuscation (iO) has emerged as a seemingly
omnipotent primitive with numerous applications to cryptography and beyond. Moreover …

The complexity of public-key cryptography

B Barak - Tutorials on the Foundations of Cryptography …, 2017 - Springer
The Complexity of Public-Key Cryptography Page 1 Chapter 2 The Complexity of Public-Key
Cryptography Boaz Barak Abstract We survey the computational foundations for public-key …