Back to Results
First PageMeta Content
IP / Homomorphic encryption / Zero-knowledge proof / NP / One-way function / Cryptography / Applied mathematics / Cryptographic protocols


ON NON-BLACK-BOX SIMULATION AND THE IMPOSSIBILITY OF APPROXIMATE OBFUSCATION ∗ NIR BITANSKY† AND OMER PANETH‡ Abstract. The introduction of a non-black-box simulation technique by Barak (FOCShas been a major
Add to Reading List

Document Date: 2015-04-22 10:26:13


Open Document

File Size: 718,80 KB

Share Result on Facebook

Company

IBM / /

/

Event

FDA Phase / /

Facility

Tel Aviv University / Boston University / Check Point Institute / /

IndustryTerm

secure function evaluation protocol / complicated protocol / main technical tool / classic protocols / homomorphic evaluation algorithms / enough extraction algorithm / classic black-box zero-knowledge protocols / complicated protocols / resettably-secure protocols / resettably-sound protocols / naive protocol / resettably-sound protocol / simplified resettable protocols / resettably-sound zero-knowledge protocol / /

Organization

Check Point Institute for Information Security / National Science Foundation / Tel Aviv University / Boston University / /

Person

OMER PANETH / /

/

Position

extractor / first Author was / knowledge extractor / /

Product

Feige / Deng / Richardson / /

Technology

encryption / classic ZK protocols / concurrent ZK protocols / simultaneously-resettable ZK protocol / cryptography / naive resettably-sound ZK protocol / 4-message ZK protocol / enough extraction algorithm / known protocols / secure function evaluation protocol / symmetric-key encryption / resettably-sound protocols / CCA-1 symmetric encryption / resettably-secure protocols / concurrent ZK protocol / simultaneouslyresettable ZK protocol / resettably-sound protocol / resettably-sound zero-knowledge protocol / classic black-box zero-knowledge protocols / rather complicated protocols / rather complicated protocol / naive protocol / 4-message resettably-sound ZK protocol / two-message secure function evaluation protocol / resettably-sound ZK protocol / secret key / revised protocol / SIMULATION / homomorphic evaluation algorithms / simplified resettable protocols / /

SocialTag