Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
Abstract
References
Index Terms
- Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
Recommendations
How to use indistinguishability obfuscation: deniable encryption, and more
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingWe introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic problems. We use this technique to carry out a systematic study of the applicability of indistinguishability obfuscation to a ...
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation
Applied Cryptography and Network SecurityAbstract(Fully) homomorphic encryption ((F)HE) allows users to publicly evaluate circuits on encrypted data. Although public homomorphic evaluation property has various applications, (F)HE cannot achieve security against chosen ciphertext attacks (CCA2) ...
On Succinct Non-interactive Arguments in Relativized Worlds
Advances in Cryptology – EUROCRYPT 2022AbstractSuccinct non-interactive arguments of knowledge (SNARKs) are cryptographic proofs with strong efficiency properties. Applications of SNARKs often involve proving computations that include the SNARK verifier, a technique called recursive ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/de19c9d1-d71b-445e-8b46-5fbe0094e40c/3618260.cover.jpg)
- General Chairs:
- Bojan Mohar,
- Igor Shinkar,
- Program Chair:
- Ryan O'Donnell
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Science Foundation
- Simons Foundation
- Microsoft
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 30Total Downloads
- Downloads (Last 12 months)30
- Downloads (Last 6 weeks)30
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in