Back to Results
First PageMeta Content
Public-key cryptography / IP / One-way function / Communications protocol / Fuse / Cryptography / Homomorphic encryption / Zero-knowledge proof


On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky∗ and Omer Paneth† Tel Aviv University and Boston University April 23, 2015 This is an out of date draft that is
Add to Reading List

Document Date: 2015-04-23 15:21:41


Open Document

File Size: 585,17 KB

Share Result on Facebook

Company

IBM / /

Event

FDA Phase / /

Facility

Omer Paneth† Tel Aviv University / Boston University / Check Point Institute / /

IndustryTerm

secure protocols / recent protocol / message sub-protocol / sixmessage protocol / simultaneously-resettable zero-knowledge protocol / simultaneous resettable protocol / resettable secure computation protocols / non-blackbox protocol / knowledge protocol / secure function evaluation protocol / stateless hardware / cryptographic protocols / resettable protocols / et al. protocol / simultaneouslyresettable protocols / obfuscator algorithm / heavy machinery / resettably-sound protocols / proof systems / simultaneously-resettable witness-indistinguishable protocol / resettably-sound protocol / encryption algorithm / construction resettably-sound protocols / /

Organization

Check Point Institute for Information Security / National Science Foundation / Tel Aviv University / Boston University / /

Person

Omer Paneth / /

Position

extractor / non-black-box knowledge extractor / /

Product

PRS02 / CPS13 / BP12 / RK99 / Nao91 / Richardson / Bar01 / CP13 / BGGL01 / Feige / OV12 / FS89 / DGS09 / DN07 / /

ProgrammingLanguage

C / /

ProvinceOrState

Wisconsin / /

Technology

two message sub-protocol / four-message protocol / corresponding protocol / simultaneously-resettable zero-knowledge protocol / secure function evaluation protocol / encryption algorithm / simultaneously-resettable WI protocol / symmetric-key encryption / CCA-1 symmetric encryption / obfuscator algorithm / resettably-sound protocol / secret key / constant-round resettably-sound ZK protocol / random encryption / non-blackbox protocol / sixmessage protocol / Encryption / constructsimultaneously-resettable ZK protocols / simultaneously-resettable ZK protocol / Base Protocol / Cryptography / ZK protocols / six-message resettably-sound ZK protocol / simultaneous resettable protocol / resettably-sound protocols / concurrent ZK protocol / Barak et al. protocol / simultaneously-resettable witness-indistinguishable protocol / construction resettably-sound protocols / resettably-sound ZK protocol / knowledge protocol / simulation / Slotbased protocols / Resettable Protocols / ZK protocol / stand-alone ZK protocols / resettable secure computation protocols / four-message resettably-sound ZK protocol / resettable ZK protocols / /

URL

http /

SocialTag