搜索结果: 1-12 共查到“Branching Programs”相关记录12条 . 查询时间(0.078 秒)
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
attribute-based signatures arithmetic branching programs arithmetic span programs
2019/4/10
This paper presents the first attribute-based signature (ABS) scheme in which the correspondence between signers and signatures is captured in an arithmetic model of computation. Specifically, we desi...
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Graded encodings indistinguishability obfuscation
2018/4/19
We present new constructions of private constrained PRFs and lockable obfuscation, for constraints (resp. functions to be obfuscated) that are computable by general branching programs. Our constructio...
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
multilinear maps matrix branching programs functional encryption
2016/6/17
Secure multilinear maps (mmaps) have been shown to have remarkable applications in cryptography, such as program obfuscation and multi-input functional encryption (MIFE). To date, there has been littl...
Deniable Attribute Based Encryption for Branching Programs from LWE
attribute based encryption LWE
2016/6/6
Deniable encryption (Canetti et al. CRYPTO ’97) is an intriguing primitive that provides a security
guarantee against not only eavesdropping attacks as required by semantic security, but also stronge...
The distinguishability of product distributions by read-once branching programs
distinguishability product distributions read-once branching programs
2016/1/23
We improve the main result of Brody and Verbin [7] from FOCS 2010 on the power of constant-width branching programs to distinguish product distributions. Specifically, we show that a coin must have bi...
In this work, we seek to extend the capabilities of the “core obfuscator” from the work of Garg, Gentry, Halevi, Raykova, Sahai, and Waters (FOCS 2013), and all subsequent works constructing general-p...
Riding on Asymmetry: Efficient ABE for Branching Programs
LWE Attribute-Based Encryption Branching Programs
2016/1/6
In an Attribute-Based Encryption (ABE) scheme the ciphertext encrypting a message ?
is associated with a public attribute vector x and a secret key skP is associated with a predicate P.
The decrypti...
Near Optimal Rate Homomorphic Encryption for Branching Programs
branching programs CPIR homomorphic encryption
2016/1/6
We initiate the study of good rate homomorphic encryption schemes. Based on previous
work on securely evaluating (binary I/O) branching programs, we propose a leveled homomorphic
encryption scheme f...
Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups
Obfuscation generic group model pseudo-free groups
2014/3/10
We show that the class of polynomial-size branching programs can be obfuscated according to a virtual black-box notion akin to that of Barak et al. [Crypto 01], in an idealized black-box group model o...
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
cryptographic protocols secure computation
2014/3/13
Halevi, Lindell, and Pinkas (CRYPTO 2011) recently proposed a model for secure computation that captures communication patterns that arise in many practical settings, such as secure computation on the...
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Secure Evaluation Private Linear Branching Programs Medical Applications
2009/6/12
Diagnostic and classification algorithms play an important role in data analysis, with applications
in areas such as health care, fault diagnostics, or benchmarking. Branching programs (BP)
is a pop...
Private Branching Programs:On Communication-Efficient Cryptocomputing Fourth eprint version, September 30, 2008
Branching program computationally-private information retrieval cryptocomputing
2009/6/3
We polish a recent cryptocomputing method of Ishai and Paskin from TCC 2007. More precisely, we
show that every function can be cryptocomputed in communication, linear in the product of client’s inpu...