Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd annual ACM SIGACT …, 2021‏ - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Pad-net: Multi-tasks guided prediction-and-distillation network for simultaneous depth estimation and scene parsing

D Xu, W Ouyang, X Wang… - Proceedings of the IEEE …, 2018‏ - openaccess.thecvf.com
Depth estimation and scene parsing are two particularly important tasks in visual scene
understanding. In this paper we tackle the problem of simultaneous depth estimation and …

Candidate indistinguishability obfuscation and functional encryption for all circuits

S Garg, C Gentry, S Halevi, M Raykova, A Sahai… - SIAM Journal on …, 2016‏ - SIAM
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …

Candidate multilinear maps from ideal lattices

S Garg, C Gentry, S Halevi - … 32nd Annual International Conference on the …, 2013‏ - Springer
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …

Indistinguishability Obfuscation from LPN over , DLIN, and PRGs in NC

A Jain, H Lin, A Sahai - Annual International Conference on the Theory …, 2022‏ - Springer
In this work, we study what minimal sets of assumptions suffice for constructing
indistinguishability obfuscation (i O). We prove: Theorem (Informal): Assume sub …

Fully secure functional encryption for inner products, from standard assumptions

S Agrawal, B Libert, D Stehlé - Annual International Cryptology …, 2016‏ - Springer
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …

Attribute-based encryption for circuits

S Gorbunov, V Vaikuntanathan, H Wee - Journal of the ACM (JACM), 2015‏ - dl.acm.org
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public
index ind and a message m, and a secret key is associated with a Boolean predicate P. The …

Multi-input functional encryption

S Goldwasser, SD Gordon, V Goyal, A Jain… - Advances in Cryptology …, 2014‏ - Springer
We introduce the problem of Multi-Input Functional Encryption, where a secret key sk f can
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …

Reusable garbled circuits and succinct functional encryption

S Goldwasser, Y Kalai, RA Popa… - Proceedings of the forty …, 2013‏ - dl.acm.org
Garbled circuits, introduced by Yao in the mid 80s, allow computing a function f on an input x
without leaking anything about f or x besides f (x). Garbled circuits found numerous …

Functional signatures and pseudorandom functions

E Boyle, S Goldwasser, I Ivan - International workshop on public key …, 2014‏ - Springer
We introduce two new cryptographic primitives: functional digital signatures and functional
pseudorandom functions. In a functional signature scheme, in addition to a master signing …