Slide 48
Slide 48 text
3FGFSFODFT
• [SW14] Sahai, A., & Waters, B. (2014, May). How to use indistinguishability obfuscation: deniable encryption, and more. In Proceedings of the forty-sixth
annual ACM symposium on Theory of computing (pp. 475-484).
• [JLL+23] Jain, A., Lin, H., Luo, J., & Wichs, D. (2023, August). The pseudorandom oracle model and ideal obfuscation. In Annual International Cryptology
Conference (pp. 233-262). Cham: Springer Nature Switzerland.
• [BGI+01] Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., & Yang, K. (2001, August). On the (im) possibility of obfuscating
programs. In Annual international cryptology conference (pp. 1-18). Berlin, Heidelberg: Springer Berlin Heidelberg.
• [GR07] Goldwasser, S., & Rothblum, G. N. (2007). On best-possible obfuscation. In Theory of Cryptography: 4th Theory of Cryptography Conference,
TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings 4 (pp. 194-213). Springer Berlin Heidelberg.
• [JLS22] Jain, A., Lin, H., & Sahai, A. (2022, May). Indistinguishability obfuscation from LPN over F p, DLIN, and PRGs in NC 0. In Annual International
Conference on the Theory and Applications of Cryptographic Techniques (pp. 670-699). Cham: Springer International Publishing.
• [GGH+13] Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., & Waters, B. (2016). Candidate indistinguishability obfuscation and functional
encryption for all circuits. SIAM Journal on Computing, 45(3), 882-929.
• [BV18] Bitansky, N., & Vaikuntanathan, V. (2018). Indistinguishability obfuscation from functional encryption. Journal of the ACM (JACM), 65(6), 1-37.
• [JLS21] Jain, A., Lin, H., & Sahai, A. (2021, June). Indistinguishability obfuscation from well-founded assumptions. In Proceedings of the 53rd Annual ACM
SIGACT Symposium on Theory of Computing (pp. 60-73).