共 55 条
[11]
Sum-of-Squares Meets Program Obfuscation, Revisited
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I,
2019, 11476
:226-250
[12]
Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
[13]
Barak B, 2010, LECT NOTES COMPUT SC, V6110, P423
[14]
Bellare Mihir, 1993, ACM CCS 1993, P62, DOI DOI 10.1145/168588.168596
[15]
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II,
2016, 9986
:391-418
[16]
Indistinguishability Obfuscation from Functional Encryption
[J].
2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2015,
:171-190
[17]
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I,
2014, 8616
:480-499
[18]
Brakerski Z., 2019, 2019720 CRYPT EPRINT
[19]
Brakerski Z, 2014, LECT NOTES COMPUT SC, V8349, P1, DOI 10.1007/978-3-642-54242-8_1
[20]
Brakerski Zvika., 2014, ITCS, P1, DOI DOI 10.1145/2554797.2554799