Back to Results
First PageMeta Content
Source code / Symbol / Computing / Computer programming / Obfuscated code / Obfuscation


On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Sanjam Garg ∗
Add to Reading List

Document Date: 2014-06-13 13:40:01


Open Document

File Size: 374,69 KB

Share Result on Facebook

Company

IBM / /

/

Facility

Northeastern University / /

IndustryTerm

deterministic signing algorithm / polynomial-time algorithms / recent applications / /

Organization

European Union / Northeastern University / US Federal Reserve / /

Person

Craig Gentry / Hada / Kalai / Daniel Wichs§ June / /

Position

PPT extractor / extractor / candidate for this algorithm / /

ProgrammingLanguage

C / /

Technology

Encryption / extractable witness encryption / extractable/functional witness encryption / deterministic signing algorithm / following two polynomial-time algorithms / PPT algorithm / witness encryption / candidate extractable witness encryption / 4 Extractable Witness Encryption / /

SocialTag