Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] On the (Im)possibility of Obfuscating Programs - Boaz BarakJul 18, 2010 · The paper [GR] proposes and explores a def- inition of obfuscation that does not fall within the scope of our impossibility result (and is ...
-
[2]
[PDF] Candidate Indistinguishability Obfuscation and Functional ...Jul 21, 2013 · The main contributions of this work are to (1) construct indistinguishability obfuscators for all circuits, and (2) show how to use ...
-
[3]
[PDF] Indistinguishability Obfuscation from Well-Founded AssumptionsNov 12, 2020 · Indistinguishability obfuscation (iO) compiles programs into unintelligible ones while preserving functionality. For circuits C0 and C1, iO(C0) ...
-
[4]
[PDF] A Straightforward Construction of Indistinguishability Obfuscation ...Indistinguishability obfuscation (iO) has seen remarkable theoretical progress, yet it remains impractical due to its high complexity and inefficiency. A common ...
-
[5]
[PDF] How to Use Indistinguishability Obfuscation: Deniable Encryption ...This idea was first proposed by Diffie and Hellman in their original paper on public-key cryptography [DH76]. For example, consider the following simple and ...
-
[6]
On the (Im)possibility of Obfuscating ProgramsPaper 2001/069. On the (Im)possibility of Obfuscating Programs. Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, ...
-
[7]
Indistinguishability Obfuscation from Circular SecurityAug 22, 2020 · Indistinguishability Obfuscation from Circular Security. Romain Gay and ... subexponential security of: - the Learning with Error (LWE) ...
-
[8]
How to Use Indistinguishability Obfuscation: Deniable Encryption ...Jul 23, 2013 · We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic problems.
-
[9]
Using Indistinguishability Obfuscation via UCEs### Summary on Composability
-
[10]
Zero-Knowledge and Code Obfuscation - SpringerLinkOct 27, 2000 · In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK).
-
[11]
On the (Im)possibility of Obfuscating Programs.No information is available for this page. · Learn why
-
[12]
On the (Im)possibility of Obfuscating Programs - SpringerLinkOn the (im)possibility of obfuscating programs. Technical report, Electronic Colloquium on Computational Complexity, 2001. http://www.eccc.uni-trier.de/eccc.
-
[13]
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits### Summary of Security Properties, Subexp, VBB, Average Worst from Garg et al. (2013)
-
[14]
Lattice-based Obfuscation from NTRU and Equivocal LWEJun 15, 2025 · Indistinguishability obfuscation (iO) turns a program unintelligible without altering its functionality and is a powerful cryptographic ...
-
[15]
Indistinguishability Obfuscation from DDH-like Assumptions on ...called the joint-SXDH ...
-
[16]
Indistinguishability Obfuscation from Functional EncryptionFeb 27, 2015 · ... subexponential security. This shows the equivalence of indistinguishability obfuscation and public-key functional en- cryption, a primitive ...
- [17]
-
[18]
[PDF] Delegating RAM Computations with Adaptive Soundness and PrivacyOct 18, 2016 · Our scheme assumes the existence of indistinguishability obfuscation (iO) for circuits and the decisional Diffie-Hellman (DDH) assumption.
-
[19]
[PDF] Indistinguishability Obfuscation of Null Quantum Circuits and ...This means that the evaluator and the obfuscator would most likely end up with a different cipher- text even though they are computing the same function. This ...
-
[20]
[PDF] SoK: Use of Cryptography in Malware ObfuscationSection 7 discusses cryptographic notions of obfuscation, such as indistinguishability obfuscation [5], and its relation to malware obfuscation defined in this ...
-
[21]
[PDF] Lattices Multilinear Maps Obfuscation - Simons InstituteIndistinguishability obfuscation. Lockable obfuscation. (Compute-then-Compare ... Multilinear maps. GGH13, CLT13, GGH15. Lockable Obfuscation. (Compute-then ...
-
[22]
MachinaIO - PSEProject Overview. The MachinaIO project aims to develop the first practical implementation of Indistinguishability Obfuscation (iO).
-
[23]
a taxonomy of software obfuscation techniques for layered securityApr 3, 2020 · Barak (2016) reviewed the importance of indistinguishability obfuscation. ... You, I, Yim K (2010) Malware obfuscation techniques: a brief survey ...Missing: considerations backdoors
-
[24]
Indistinguishability obfuscation for secure software - Columbia CSIndistinguishability obfuscation encrypts software so it still performs its function, but the code is not reverse-engineered, and two obfuscations are ...
-
[25]
[PDF] Lower Bounds on the Overhead of Indistinguishability ObfuscationThis concept was first introduced by Barak et al. ... Alongside the research on the theoretical founda- tions of indistinguishability obfuscation, considerable ...<|control11|><|separator|>
-
[26]
[PDF] Constructions for Quantum Indistinguishability ObfuscationAn indistinguishability obfuscator is a probabilistic polynomial-time algorithm that takes a circuit as input and outputs a new circuit that has the same ...
-
[27]
Indistinguishability Obfuscation for RAM Programs and Succinct ...We show how to construct indistinguishability obfuscation (\bf iO) for RAM programs with bounded space, assuming \bf iO for circuits and one-way functions, ...
-
[28]
[PDF] Evasive LWE: Attacks, Variants & ObfustopiaSecure obfuscation in a weak multilinear map model. In Martin Hirt and. Adam D. Smith, editors, TCC 2016-B, Part II, volume 9986 of LNCS, pages 241–268 ...
-
[29]
Indistinguishability Obfuscation, Range Avoidance, and Bounded ...In this work, we prove under the existence of subexponentially secure indistinguishability obfuscation (iO) that polynomial-time deterministic algorithms for ...