Главная
Study mode:
on
1
Introduction
2
What assumptions could give us IO
3
Allornothing nature
4
Blackbox construction
5
Highlevel ideas
6
Defining idealized Oracle
7
Defining decryption
8
Hidden Queries
9
Summary
Description:
Explore a presentation from Crypto 2017 on lower bounds for obfuscation derived from all-or-nothing encryption. Delve into the paper by Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed as they discuss key assumptions for indistinguishability obfuscation, the nature of all-or-nothing constructs, and blackbox implementations. Examine high-level concepts, the definition of idealized oracles and decryption processes, and the role of hidden queries in this cryptographic research. Gain insights into cutting-edge obfuscation techniques and their theoretical foundations in this 21-minute talk that covers introduction, assumptions, constructions, and a comprehensive summary of findings.

Lower Bounds on Obfuscation from All or Nothing Encryption

TheIACR
Add to list
0:00 / 0:00