Securely Obfuscating Re-Encryption
@article{Hohenberger2010SecurelyOR, title={Securely Obfuscating Re-Encryption}, author={S. Hohenberger and G. N. Rothblum and A. Shelat and V. Vaikuntanathan}, journal={Journal of Cryptology}, year={2010}, volume={24}, pages={694-719} }
We present a positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known impossibility results (Barak et al. in Advances in Cryptology—CRYPTO’01, 2002), for general obfuscation and recent impossibility and implausibility (Goldwasser and Kalai in 46th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 553–562, 2005) results for obfuscation of many cryptographic functionalities.Whereas other positive obfuscation… CONTINUE READING
Figures and Topics from this paper
Figures
150 Citations
Indistinguishability Obfuscation from Functional Encryption
- Mathematics, Computer Science
- 2015 IEEE 56th Annual Symposium on Foundations of Computer Science
- 2015
- 105
- PDF
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2011
- 18
- PDF
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
- Computer Science
- Secur. Commun. Networks
- 2016
- 1
Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures
- Computer Science
- 2013 Ninth International Conference on Computational Intelligence and Security
- 2013
- 4
References
SHOWING 1-10 OF 33 REFERENCES
Obfuscation for Cryptographic Purposes
- Computer Science, Mathematics
- Journal of Cryptology
- 2009
- 73
- Highly Influential
- PDF
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information
- Computer Science, Mathematics
- CRYPTO
- 1997
- 345
- Highly Influential
- PDF
Improved proxy re-encryption schemes with applications to secure distributed storage
- Computer Science
- TSEC
- 2006
- 1,378
- PDF