ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
116
views
30
references
Top references
cited by
26
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,005
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
other
Author(s):
Zvika Brakerski
,
Guy N. Rothblum
Publication date
(Print):
2014
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The conundrum of Virtual Research Environments, Science Gateways, Virtual Laboratories, Collaboratories
Most cited references
30
Record
: found
Abstract
: not found
Book Chapter
: not found
Lower Bounds for Discrete Logarithms and Related Problems
Victor Shoup
(1997)
0
comments
Cited
119
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Founding crytpography on oblivious transfer
Joe Kilian
(1988)
0
comments
Cited
116
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
…
(2013)
0
comments
Cited
100
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 1-25
DOI:
10.1007/978-3-642-54242-8_1
SO-VID:
baaec2ea-8a58-47bd-a421-e5534a50d200
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
pp. 52
On Extractability Obfuscation
pp. 74
Two-Round Secure MPC from Indistinguishability Obfuscation
pp. 440
Non-malleable Coding against Bit-Wise and Split-State Tampering
pp. 465
Continuous Non-malleable Codes
pp. 489
Locally Updatable and Locally Decodable Codes
pp. 616
Dual System Encryption via Predicate Encodings
Similar content
1,005
Performing secrecy: hiding and obfuscation in Frontex’s pushbacks scandal
Authors:
Georgios Glouftsios
PowerDrive: accurate de-obfuscation and analysis of PowerShell malware
Authors:
D UGARTE
,
D. Maiorca
,
F. Cara
…
Practical Image Obfuscation with Provable Privacy
Authors:
Liyue Fan
See all similar
Cited by
26
Protecting Obfuscation against Algebraic Attacks
Authors:
Boaz Barak
,
Sanjam Garg
,
Yael Tauman Kalai
…
On Extractability Obfuscation
Authors:
Elette Boyle
,
Kai-Min Chung
,
Rafael Pass
Graph-Induced Multilinear Maps from Lattices
Authors:
Craig Gentry
,
Sergey Gorbunov
,
Shai Halevi
See all cited by