#### Filter Results:

- Full text PDF available (34)

#### Publication Year

1946

2017

- This year (1)
- Last 5 years (34)
- Last 10 years (36)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

Succinct non-interactive arguments (SNARGs) enable verifying NP statements with lower complexity than required for classical NP verification. Traditionally, the focus has been on minimizing the length of such arguments; nowadays researches have focused also on minimizing verification time, by drawing motivation from the problem of delegating computation. A… (More)

- Nir Bitansky, Omer Paneth, Alon Rosen
- 2015 IEEE 56th Annual Symposium on Foundations of…
- 2014

We prove that finding a Nash equilibrium of a game is hard, assuming the existence of indistinguishability obfuscation and one-way functions with sub-exponential hardness. We do so by showing how these cryptographic primitives give rise to a hard computational problem that lies in the complexity class PPAD, for which finding Nash equilibrium is complete.… (More)

- Ran Canetti, Yael Tauman Kalai, Omer Paneth
- IACR Cryptology ePrint Archive
- 2015

Assuming trapdoor permutations, we show that there exist function families that cannot be VBB-obfuscated even if both the obfuscator and the obfuscated program have access to a random oracle. Specifically, these families are the robust unobfuscatable families of [Bitansky-Paneth, STOC 13]. Our result stands in contrast to the general VBB obfuscation… (More)

- Nir Bitansky, Omer Paneth
- TCC
- 2012

We construct 3-round proofs and arguments with negligible soundness error satisfying two relaxed notions of zero-knowledge (ZK): weak ZK and witness hiding (WH). At the heart of our constructions lie new techniques based on point obfuscation with auxiliary input (AIPO). It is known that such protocols cannot be proven secure using black-box reductions (or… (More)

- Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
- IACR Cryptology ePrint Archive
- 2013

We study the problem of verifiable delegation of computation over outsourced data, whereby a powerful worker maintains a large data structure for a weak client in a verifiable way. Compared to the well-studied problem of verifiable computation, this setting imposes additional difficulties since the ver-ifier needs to verify consistency of updates succinctly… (More)

- Omer Paneth, Guy N. Rothblum
- IACR Cryptology ePrint Archive
- 2014

We construct publicly verifiable non-interactive arguments that can be used to delegate polynomial time computations. These computationally sound proof systems are completely non-interactive in the common reference string model. The verifier's running time is nearly-linear in the input length, and poly-logarithmic in the complexity of the delegated… (More)

- Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam D. Smith
- EUROCRYPT
- 2016

Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a secret into the same uniformly distributed key. To eliminate noise, they require an initial enrollment phase that takes the first noisy reading of the secret and produces a nonsecret helper string to be used in subsequent readings. Reusable fuzzy extractors (Boyen, CCS… (More)

- Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
- IACR Cryptology ePrint Archive
- 2013

The goal of general-purpose program obfuscation is to make an arbitrary computer program " unin-telligible " while preserving its functionality. At least as far back as the work of Diffie and Hellman in 1976, researchers have contemplated applications of general-purpose obfuscation. However, until 2013, even heuristic constructions for general-purpose… (More)

This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable for functional encryption (FE) and its relation to the weaker indistinguishability-based security (IND-security). Our main result is a compiler that transforms any FE scheme for the general circuit functionality (which we denote by Circuit-FE) meeting… (More)

- Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
- IACR Cryptology ePrint Archive
- 2014

A function <i>f</i> is extractable if it is possible to algorithmically "extract," from any adversarial program that outputs a value <i>y</i> in the image of <i>f;</i> a preimage of <i>y</i>. When combined with hardness properties such as one-wayness or collision-resistance, extractability has proven to be a powerful tool. However, so far, extractability… (More)