Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Candidate obfuscation via oblivious LWE sampling

H Wee, D Wichs - Annual International Conference on the Theory and …, 2021 - Springer
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …

Indistinguishability obfuscation from circular security

R Gay, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …

Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum

A Jain, H Lin, P Lou, A Sahai - … International Conference on the Theory and …, 2023 - Springer
Indistinguishability Obfuscation (i O) is a highly versatile primitive implying a myriad
advanced cryptographic applications. Up until recently, the state of feasibility of i O was …

Indistinguishability obfuscation from simple-to-state hard problems: New assumptions, new techniques, and simplification

R Gay, A Jain, H Lin, A Sahai - … on the Theory and Applications of …, 2021 - Springer
In this work, we study the question of what set of simple-to-state assumptions suffice for
constructing functional encryption and indistinguishability obfuscation (i O), supporting all …

On succinct arguments and witness encryption from groups

O Barta, Y Ishai, R Ostrovsky, DJ Wu - Annual International Cryptology …, 2020 - Springer
Succinct non-interactive arguments (SNARGs) enable proofs of NP statements with very low
communication. Recently, there has been significant work in both theory and practice on …

Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration

S Agrawal, Y Ishai, E Kushilevitz, V Narayanan… - Advances in Cryptology …, 2021 - Springer
Can a sender encode a pair of messages (m_0, m_1)(m 0, m 1) jointly, and send their
encoding over (say) a binary erasure channel, so that the receiver can decode exactly one …

Pseudorandom Obfuscation and Applications

P Branco, N Döttling, A Jain, G Malavolta… - Cryptology ePrint …, 2024 - eprint.iacr.org
We introduce the notion of pseudorandom obfuscation (PRO), a way to obfuscate (keyed)
pseudorandom functions $ f_K $ in an average-case sense. We introduce several variants of …

Cryptographic obfuscation for smart contracts: Trustless bitcoin bridge and more

S Suegami - Blockchain: Research and Applications, 2023 - Elsevier
Privacy protection for smart contracts is currently inadequate. Existing solutions for privacy-
preserving smart contracts either support only a limited class of smart contracts or rely on …

PoS blockchain-based forward-secure public key encryption with immutable keys and post-compromise security guarantees

S Nuta, JCN Schuldt, T Nishide - IEICE Transactions on …, 2023 - search.ieice.org
We present a forward-secure public-key encryption (PKE) scheme without key update, ie
both public and private keys are immutable. In contrast, prior forward-secure PKE schemes …