Главная
Study mode:
on
1
Introduction
2
First Candidate Construction
3
Applications of IO
4
Sub Exponential Barrier
5
Applications
6
Outline
7
Functional Encryption
8
Fe2 IO Transformation
9
Intuition
10
Key Technique
11
NonInteractive Key Exchange
12
Conclusion
Description:
Explore a groundbreaking paper presented at Eurocrypt 2017 that challenges the sub-exponential barrier in obfuscation. Delve into the first candidate construction and its applications in indistinguishability obfuscation (IO). Examine the sub-exponential barrier and its implications. Discover key applications, including functional encryption and the FE2 IO transformation. Gain insights into the intuition behind the research and the key techniques employed. Learn about non-interactive key exchange and its relevance to the topic. Conclude with a comprehensive understanding of this significant advancement in cryptography and its potential impact on the field.

Breaking the Sub Exponential Barrier in Obfustopia

TheIACR
Add to list
0:00 / 0:00