Offline Witness Encryption with Semi-adaptive Security

作者: Peter Chvojka , Tibor Jager , Saqib A. Kakvi

DOI: 10.1007/978-3-030-57808-4_12

关键词:

摘要: The first construction of Witness Encryption (WE) by Garg et al. (STOC 2013) has led to many exciting avenues research in the past years. A particularly interesting variant is Offline WE (OWE) Abusalah (ACNS 2016), as encryption algorithm uses neither obfuscation nor multilinear maps.

参考文章(38)
S. Dov Gordon, Feng-Hao Liu, Elaine Shi, Constant-Round MPC with Fairness and Guarantee of Output Delivery international cryptology conference. ,vol. 2015, pp. 63- 82 ,(2015) , 10.1007/978-3-662-48000-7_4
Elette Boyle, Kai-Min Chung, Rafael Pass, On Extractability Obfuscation Theory of Cryptography. pp. 52- 73 ,(2014) , 10.1007/978-3-642-54242-8_3
Elette Boyle, Shafi Goldwasser, Ioana Ivan, Functional Signatures and Pseudorandom Functions public key cryptography. pp. 501- 519 ,(2014) , 10.1007/978-3-642-54631-0_29
Matthew D. Green, Ian Miers, Forward Secure Asynchronous Messaging from Puncturable Encryption 2015 IEEE Symposium on Security and Privacy. pp. 305- 320 ,(2015) , 10.1109/SP.2015.26
Tatsuaki Okamoto, David Pointcheval, The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes public key cryptography. pp. 104- 118 ,(2001) , 10.1007/3-540-44586-2_8
Shafi Goldwasser, Yael Tauman Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich, How to Run Turing Machines on Encrypted Data Advances in Cryptology – CRYPTO 2013. pp. 536- 553 ,(2013) , 10.1007/978-3-642-40084-1_30
Sanjam Garg, Craig Gentry, Shai Halevi, Candidate Multilinear Maps from Ideal Lattices theory and application of cryptographic techniques. pp. 1- 17 ,(2013) , 10.1007/978-3-642-38348-9_1
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters, Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits 2013 IEEE 54th Annual Symposium on Foundations of Computer Science. pp. 40- 49 ,(2013) , 10.1109/FOCS.2013.13
M. Naor, M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks symposium on the theory of computing. pp. 427- 437 ,(1990) , 10.1145/100216.100273
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang, On the (im)possibility of obfuscating programs Journal of the ACM. ,vol. 59, pp. 1- 48 ,(2012) , 10.1145/2160158.2160159