Author:
Pandey Omkant,Prabhakaran Manoj,Sahai Amit
Publisher
Springer Berlin Heidelberg
Reference103 articles.
1. Wee, H.: On obfuscating point functions. In: STOC, pp. 523–532 (2005)
2. Applebaum, B.: Bootstrapping obfuscators via fast pseudorandom functions. Cryptology ePrint Archive, Report 2013/699 (2013), http://eprint.iacr.org/2013/699.pdf
3. Barak, B.: How to go beyond the black-box simulation barrier. In: FOCS, pp. 106–115 (2001)
4. Barak, B.: Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In: FOCS (2002)
5. Lecture Notes in Computer Science;B. Barak,2014
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. One-Way Functions and (Im)perfect Obfuscation;SIAM Journal on Computing;2022-12-20
2. Review of Techniques for Privacy-Preserving Blockchain Systems;Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure;2020-10-06
3. Random Walks and Concurrent Zero-Knowledge;Applied Cryptography and Network Security;2020
4. Batch Verification for Statistical Zero Knowledge Proofs;Theory of Cryptography;2020
5. Simpler Constructions of Asymmetric Primitives from Obfuscation;Progress in Cryptology – INDOCRYPT 2020;2020