Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable

MR Albrecht, V Cini, RWF Lai, G Malavolta… - Annual International …, 2022 - Springer
A succinct non-interactive argument of knowledge (SNARK) allows a prover to produce a
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …

Hidden cosets and applications to unclonable cryptography

A Coladangelo, J Liu, Q Liu, M Zhandry - … 16–20, 2021, Proceedings, Part I …, 2021 - Springer
Abstract In 2012, Aaronson and Christiano introduced the idea of hidden subspace states to
build public-key quantum money STOC'12. Since then, this idea has been applied to realize …

How to construct quantum random functions

M Zhandry - Journal of the ACM (JACM), 2021 - dl.acm.org
Pseudorandom functions (PRFs) are one of the foundational concepts in theoretical
computer science, with numerous applications in complexity theory and cryptography. In this …

Candidate witness encryption from lattice techniques

R Tsabary - Annual International Cryptology Conference, 2022 - Springer
Witness encryption (WE), first introduced by Garg, Gentry, Sahai and Waters in, is an
encryption scheme where messages are encrypted with respect to instances of an NP …

Indistinguishability obfuscation from circular security

R Gay, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …

Witness encryption and null-IO from evasive LWE

V Vaikuntanathan, H Wee, D Wichs - … on the Theory and Application of …, 2022 - Springer
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …

Quantum lightning never strikes the same state twice. or: quantum money from cryptographic assumptions

M Zhandry - Journal of Cryptology, 2021 - Springer
Public key quantum money can be seen as a version of the quantum no-cloning theorem
that holds even when the quantum states can be verified by the adversary. In this work, we …

Secure software leasing

P Ananth, RL La Placa - Annual International Conference on the Theory …, 2021 - Springer
Formulating cryptographic definitions to protect against software piracy is an important
research direction that has not received much attention. Since natural definitions using …

Lossy cryptography from code-based assumptions

Q Dao, A Jain - Annual International Cryptology Conference, 2024 - Springer
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …