How to Use Indistinguishability Obfuscation: Deniable Encryption, and More

Download Now
Provided by: University of Teramo
Topic: Security
Format: PDF
The authors introduce a new technique, that they call punctured programs, to apply in-distinguishability obfuscation towards cryptographic problems. They use this technique to carry out a systematic study of the applicability of in-distinguishability obfuscation to a variety of cryptographic goals. Along the way, they resolve the 16-year-old open question of deniable encryption, posed by the researcher in 1997: in deniable encryption, a sender who is forced to reveal to an adversary both their message and the randomness they used for encrypting it should be able to convincingly provide \"Fake\" randomness that can explain any alternative message that they would like to pretend that they sent.
Download Now

Find By Topic