SPECIAL SECTION ON THE FORTY-NINTH ANNUAL ACM SYMPOSIUM ON THE THEORY OF COMPUTING (STOC 2017) | 0 | 0.34 | 2022 |
Indistinguishability obfuscation from well-founded assumptions | 2 | 0.36 | 2021 |
On The Round Complexity Of Black-Box Secure Mpc | 0 | 0.34 | 2021 |
Self-Processing Private Sensor Data via Garbled Encryption. | 0 | 0.34 | 2020 |
Simplifying Constructions and Assumptions for i풪. | 0 | 0.34 | 2019 |
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. | 2 | 0.36 | 2019 |
How to Leverage Hardness of Constant-Degree Expanding Polynomials over mathbb R R to build i풪 i O. | 0 | 0.34 | 2019 |
Homomorphic Encryption Standard. | 0 | 0.34 | 2019 |
Statistical Witness Indistinguishability (and more) in Two Messages. | 0 | 0.34 | 2018 |
Leakage-Resilient Secret Sharing. | 0 | 0.34 | 2018 |
Private Circuits: A Modular Approach. | 3 | 0.40 | 2018 |
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness. | 0 | 0.34 | 2018 |
Promise Zero Knowledge and its Applications to Round Optimal MPC. | 3 | 0.37 | 2018 |
Exploring Crypto Dark Matter: New Simple Prf Candidates And Their Applications | 2 | 0.35 | 2018 |
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. | 2 | 0.36 | 2018 |
Expander Graphs are Non-Malleable Codes. | 0 | 0.34 | 2018 |
Non-Interactive Multiparty Computation Without Correlated Randomness. | 2 | 0.37 | 2017 |
A note on VRFs from Verifiable Functional Encryption. | 0 | 0.34 | 2017 |
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization. | 1 | 0.34 | 2017 |
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. | 1 | 0.35 | 2017 |
Threshold Fully Homomorphic Encryption. | 1 | 0.35 | 2017 |
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps. | 21 | 0.58 | 2017 |
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks. | 9 | 0.53 | 2016 |
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits. | 20 | 0.66 | 2016 |
Hiding secrets in software: a cryptographic approach to program obfuscation. | 1 | 0.36 | 2016 |
How to Generate and Use Universal Samplers. | 12 | 0.48 | 2016 |
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security. | 5 | 0.40 | 2016 |
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. | 44 | 0.89 | 2016 |
Bounded-Communication Leakage Resilience via Parity-Resilient Circuits | 2 | 0.37 | 2016 |
On the Equivalence of Obfuscation and Multilinear Maps. | 7 | 0.44 | 2015 |
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation. | 4 | 0.40 | 2015 |
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption. | 16 | 0.55 | 2015 |
Indistinguishability Obfuscation with Constant Size Overhead. | 1 | 0.35 | 2015 |
Patchable Obfuscation. | 0 | 0.34 | 2015 |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | 70 | 1.58 | 2015 |
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. | 71 | 1.72 | 2014 |
Cryptography With One-Way Communication | 2 | 0.38 | 2014 |
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero. | 26 | 0.98 | 2014 |
Statistical Concurrent Non-Malleable Zero Knowledge. | 1 | 0.35 | 2014 |
Multi-Input Functional Encryption. | 38 | 1.02 | 2014 |
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption. | 19 | 0.73 | 2014 |
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits | 337 | 7.24 | 2013 |
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures. | 15 | 0.74 | 2013 |
Zero Knowledge LTCs and Their Applications. | 2 | 0.37 | 2013 |
Differing-Inputs Obfuscation and Applications. | 16 | 0.66 | 2013 |
Attribute-Based Encryption for Circuits from Multilinear Maps. | 112 | 3.18 | 2013 |
Secure Computation against Adaptive Auxiliary Information. | 13 | 0.52 | 2013 |
On efficient zero-knowledge PCPs | 11 | 0.46 | 2012 |
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. | 53 | 1.38 | 2012 |
New Techniques for Noninteractive Zero-Knowledge | 32 | 1.02 | 2012 |