ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
42
views
29
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
579
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography
Obfuscation of Probabilistic Circuits and Applications
other
Author(s):
Ran Canetti
,
Huijia Lin
,
Stefano Tessaro
,
Vinod Vaikuntanathan
Publication date
(Print):
2015
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Applications of SAXS
Most cited references
29
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
379
times
– based on
0
reviews
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Fully homomorphic encryption using ideal lattices
Craig Gentry
(2009)
0
comments
Cited
172
times
– based on
0
reviews
Record
: found
Abstract
: not found
Article
: not found
Probabilistic encryption
Shafi Goldwasser
,
Silvio Micali
(1984)
0
comments
Cited
128
times
– based on
0
reviews
Review now
All references
Author and book information
Book Chapter
Publication date (Print):
2015
Pages
: 468-497
DOI:
10.1007/978-3-662-46497-7_19
SO-VID:
b644daa3-bfe6-44c6-9c15-cae93d0d4715
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions
pp. 306
Function-Private Functional Encryption in the Private-Key Setting
pp. 401
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
pp. 468
Obfuscation of Probabilistic Circuits and Applications
pp. 528
Obfuscating Circuits via Composite-Order Graded Encoding
pp. 668
Public-Coin Differing-Inputs Obfuscation and Its Applications
Similar content
579
The Case for Being Average: A Mediocrity Approach to Style Masking and Author Obfuscation
Authors:
Georgi Karadjov
,
Tsvetomila Mihaylova
,
Yasen Kiprov
…
Watermarking, tamper-proofing, and obfuscation - tools for software protection
Authors:
C.S. Collberg
,
C. Thomborson
Common Program Similarity Metric Method for Anti-Obfuscation
Authors:
Xiaochuan Zhang
,
Jianmin Pang
,
Xiaonan Liu
See all similar
Cited by
8
Indistinguishability Obfuscation from Compact Functional Encryption
Authors:
Prabhanjan Ananth
,
Abhishek Jain
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
Authors:
Huijia Lin
Spooky Encryption and Its Applications
Authors:
Yevgeniy Dodis
,
Shai Halevi
,
Ron Rothblum
…
See all cited by