Author:
Kitagawa Fuyuki,Nishimaki Ryo,Tanaka Keisuke
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference91 articles.
1. B. Applebaum, Z. Brakerski, Obfuscating circuits via composite-order graded encoding. J. Cryptol. 34(2), 14 (2021)
2. P. Ananth, Z. Brakerski, G. Segev, V. Vaikuntanathan, From selective to adaptive security in functional encryption, in R. Gennaro, M.J.B. Robshaw, editors, CRYPTO 2015, Part II, vol. 9216 of LNCS (Springer, Heidelberg, 2015), pp. 657–677
3. D. Apon, N. Döttling, S. Garg, P. Mukherjee, Cryptanalysis of indistinguishability obfuscations of circuits over GGH13, in I. Chatzigiannakis, P. Indyk, F. Kuhn, A. Muscholl, editors, ICALP 2017, vol. 80 of LIPIcs (Schloss Dagstuhl, 2017), pp. 38:1–38:16
4. P.V. Ananth, D. Gupta, Y. Ishai, A. Sahai, Optimizing obfuscation: Avoiding Barrington’s theorem, in G.-J. Ahn, M. Yung, N. Li, editors, ACM CCS 2014 (ACM Press, 2014), pp. 646–658
5. S. Agrawal, Stronger security for reusable garbled circuits, general definitions and attacks, in J. Katz, H. Shacham, editors, CRYPTO 2017, Part I, vol. 10401 of LNCS (Springer, Heidelberg, 2017), pp. 3–35