Securely Obfuscating Re-Encryption

@article{Hohenberger2010SecurelyOR,
  title={Securely Obfuscating Re-Encryption},
  author={S. Hohenberger and G. N. Rothblum and A. Shelat and V. Vaikuntanathan},
  journal={Journal of Cryptology},
  year={2010},
  volume={24},
  pages={694-719}
}
  • S. Hohenberger, G. N. Rothblum, +1 author V. Vaikuntanathan
  • Published 2010
  • Computer Science
  • Journal of Cryptology
  • We present a positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known impossibility results (Barak et al. in Advances in Cryptology—CRYPTO’01, 2002), for general obfuscation and recent impossibility and implausibility (Goldwasser and Kalai in 46th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 553–562, 2005) results for obfuscation of many cryptographic functionalities.Whereas other positive obfuscation… CONTINUE READING
    150 Citations
    Secure Obfuscation for Encrypted Signatures
    • S. Hada
    • Mathematics, Computer Science
    • EUROCRYPT
    • 2010
    • 46
    • PDF
    Indistinguishability Obfuscation from Functional Encryption
    • 105
    • PDF
    Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
    • 18
    • PDF
    Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
    • 1
    Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures
    • 4
    Chosen Ciphertext Security via Point Obfuscation
    • 19
    • PDF
    Secure Obfuscation for Encrypted Group Signatures
    • 8
    • PDF

    References

    SHOWING 1-10 OF 33 REFERENCES
    On obfuscating point functions
    • H. Wee
    • Computer Science, Mathematics
    • STOC '05
    • 2005
    • 244
    • Highly Influential
    • PDF
    How to Shuffle in Public
    • 68
    • PDF
    Obfuscation for Cryptographic Purposes
    • 73
    • Highly Influential
    • PDF
    On the (Im)possibility of Obfuscating Programs
    • 1,382
    • Highly Influential
    • PDF
    Zero-Knowledge and Code Obfuscation
    • S. Hada
    • Computer Science
    • ASIACRYPT
    • 2000
    • 135
    • PDF
    Divertible Protocols and Atomic Proxy Cryptography
    • 1,254
    • PDF
    Proxy Cryptography Revisited
    • 233
    • PDF
    Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information
    • 345
    • Highly Influential
    • PDF
    Improved proxy re-encryption schemes with applications to secure distributed storage
    • 1,378
    • PDF
    Proxy cryptography revisted
    • 241