Back to Results
First PageMeta Content
Random oracle / Pseudorandom generator / One-way function / Pseudorandom function family / Zero-knowledge proof / Oracle machine / Feistel cipher / Cryptography / Pseudorandomness / Ciphertext indistinguishability


Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗
Add to Reading List

Document Date: 2015-04-16 07:03:25


Open Document

File Size: 353,95 KB

Share Result on Facebook

Company

Setup KG / oracle KG / /

Country

Israel / /

/

Facility

Hebrew University of Jerusalem / /

IndustryTerm

bit-agreement protocols / index-generation algorithm / perfectly-complete protocols / probabilistic algorithm / evaluation algorithm / probabilistic polynomial-time algorithm / The key-generation algorithm / deterministic algorithm / encryption algorithm / perfectly-complete bit-agreement protocol / bit-agreement protocol / /

Organization

Paper Organization / Israel Science Foundation / School of Computer Science and Engineering / Hebrew University of Jerusalem / Jerusalem / European Union / /

Person

Theorem / /

Position

standard model / /

RadioStation

CORE / /

Technology

Encryption / The key-generation algorithm / cryptography / key-agreement protocol / public-key encryption / CCA-secure public-key encryption / encryption algorithm / re-randomizable encryption / 2.2 Private-Key Functional Encryption / setup algorithm / The index-generation algorithm / deterministic algorithm / adaptively-secure functional encryption / public-key functional encryption / private-key functional encryption / bit-agreement protocols / multi-input functional encryption / secret key / probabilistic polynomial-time algorithm / Bit-Agreement Protocol / The evaluation algorithm / key-agreement protocols / 2.4 Key-Agreement Protocols / probabilistic algorithm / 5 2.2 Private-Key Functional Encryption / /

SocialTag