Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/
@inproceedings{brakerski2010circular,
title={Circular and leakage resilient public-key encryption under subgroup indistinguishability},
author={Brakerski, Zvika and Goldwasser, Shafi},
booktitle={Annual Cryptology Conference},
pages={1--20},
year={2010},
organization={Springer}
}
@inproceedings{boneh2008circular,
title={Circular-secure encryption from decision diffie-hellman},
author={Boneh, Dan and Halevi, Shai and Hamburg, Mike and Ostrovsky, Rafail},
booktitle={Annual International Cryptology Conference},
pages={108--125},
year={2008},
organization={Springer}
}
@inproceedings{dodis2012randomness,
title={Randomness condensers for efficiently samplable, seed-dependent sources},
author={Dodis, Yevgeniy and Ristenpart, Thomas and Vadhan, Salil},
booktitle={Theory of Cryptography Conference},
pages={618--635},
year={2012},
organization={Springer}
}
@inproceedings{bellare2011cryptography,
title={Cryptography secure against related-key attacks and tampering},
author={Bellare, Mihir and Cash, David and Miller, Rachel},
booktitle={Advances in Cryptology -- {ASIACRYPT}},
pages={486--503},
year={2011},
organization={Springer}
}
@inproceedings{kiayias2018non,
title={Non-Malleable Codes for Partial Functions with Manipulation Detection},
author={Kiayias, Aggelos and Liu, Feng-Hao and Tselekounis, Yiannis},
year={2018},
booktitle={Advances in Cryptology -- {CRYPTO}}
}
@inproceedings{golle2002cryptographic,
title={Cryptographic primitives enforcing communication and storage complexity},
author={Golle, Philippe and Jarecki, Stanislaw and Mironov, Ilya},
booktitle={International Conference on Financial Cryptography},
pages={120--135},
year={2002},
organization={Springer}
}
@inproceedings{garg2013candidate,
title={Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits},
author={Garg, Sanjam and Gentry, Craig and Halevi, Shai and Raykova, Mariana and Sahai, Amit and Waters, Brent},
booktitle={2013 IEEE 54th Annual Symposium on Foundations of Computer Science},
pages={40--49},
year={2013},
organization={IEEE}
}
@article{barak2012possibility,
title={On the (im) possibility of obfuscating programs},
author={Barak, Boaz and Goldreich, Oded and Impagliazzo, Russell and Rudich, Steven and Sahai, Amit and Vadhan, Salil and Yang, Ke},
journal={Journal of the ACM (JACM)},
volume={59},
number={2},
pages={6},
year={2012},
publisher={ACM}
}
@inproceedings{sahai2014use,
title={How to use indistinguishability obfuscation: deniable encryption, and more},
author={Sahai, Amit and Waters, Brent},
booktitle={Proceedings of the forty-sixth annual ACM symposium on Theory of computing},
pages={475--484},
year={2014},
organization={ACM}
}
@inproceedings{canetti2010obfuscation,
title={Obfuscation of hyperplane membership},
author={Canetti, Ran and Rothblum, Guy N and Varia, Mayank},
booktitle={Theory of Cryptography Conference},
pages={72--89},
year={2010},
organization={Springer}
}
@inproceedings{DBLP:conf/ccs/BellareR93,
Author = {Mihir Bellare and Phillip Rogaway},
Booktitle = {ACM Conference on Computer and Communications Security, CCS},
Pages = {62-73},
Title = {Random Oracles are Practical: A Paradigm for Designing Efficient Protocols},
Year = {1993}
}
@article{brakerski2017obfuscating,
title={Obfuscating conjunctions},
author={Brakerski, Zvika and Rothblum, Guy N},
journal={Journal of Cryptology},
volume={30},
number={1},
pages={289--320},
year={2017},
publisher={Springer}
}
@inproceedings{dziembowski2010non,
title={Non-Malleable Codes.},
author={Dziembowski, Stefan and Pietrzak, Krzysztof and Wichs, Daniel},
booktitle={ICS},
volume={2010},
pages={1st},
year={2010},
organization={Citeseer}
}
@book{cover2012elements,
title={Elements of information theory},
author={Cover, Thomas M and Thomas, Joy A},
year={2012},
publisher={John Wiley \& Sons}
}
@inproceedings{phillips2008iris,
title={The iris challenge evaluation 2005},
author={Phillips, P Jonathon and Bowyer, Kevin W and Flynn, Patrick J and Liu, Xiaomei and Scruggs, W Todd},
booktitle={Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on},
pages={1--8},
year={2008},
organization={IEEE}
}
@article{garg2016candidate,
title={Candidate indistinguishability obfuscation and functional encryption for all circuits},
author={Garg, Sanjam and Gentry, Craig and Halevi, Shai and Raykova, Mariana and Sahai, Amit and Waters, Brent},
journal={SIAM Journal on Computing},
volume={45},
number={3},
pages={882--929},
year={2016},
publisher={SIAM}
}
@inproceedings{agrawal2015explicit,
title={Explicit non-malleable codes against bit-wise tampering and permutations},
author={Agrawal, Shashank and Gupta, Divya and Maji, Hemanta K and Pandey, Omkant and Prabhakaran, Manoj},
booktitle={Advances in Cryptology -- {CRYPTO}},
pages={538--557},
year={2015},
organization={Springer}
}
@inproceedings{agrawal2015rate,
title={A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations},
author={Agrawal, Shashank and Gupta, Divya and Maji, Hemanta K and Pandey, Omkant and Prabhakaran, Manoj},
booktitle={Theory of Cryptography Conference},
pages={375--397},
year={2015},
organization={Springer}
}
@Article{Wen2018,
author="Wen, Yunhua
and Liu, Shengli
and Han, Shuai",
title="Reusable fuzzy extractor from the decisional Diffie--Hellman assumption",
journal="Designs, Codes and Cryptography",
year="2018",
month="Jan",
day="25",
abstract="Fuzzy extractors convert noisy non-uniform readings of secret sources into reliably reproducible, uniformly random strings, which in turn are used in cryptographic applications. Reusable fuzzy extractor allows multiple uses of the same secret source. In this paper, we construct the first strongly reusable fuzzy extractor which tolerates linear fraction of errors, with security tightly reduced to the decisional Diffie--Hellman (DDH) assumption in the standard model. Our construction is simple and efficient. Only two group operations and an evaluation of a hash function are added compared with the traditional construction of non-reusable fuzzy extractors.",
issn="1573-7586",
doi="10.1007/s10623-018-0459-4",
url="https://doi.org/10.1007/s10623-018-0459-4"
}
@article{galbally2014image,
title={Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition},
author={Galbally, Javier and Marcel, S{\'e}bastien and Fierrez, Julian},
journal={IEEE transactions on image processing},
volume={23},
number={2},
pages={710--724},
year={2014},
publisher={IEEE}
}
@inproceedings{zuo2006model,
title={A model based, anatomy based method for synthesizing iris images},
author={Zuo, Jinyu and Schmid, Natalia A},
booktitle={International Conference on Biometrics},
pages={428--435},
year={2006},
organization={Springer}
}
@inproceedings{valiant2011estimating,
title={Estimating the unseen: an n/log (n)-sample estimator for entropy and support size, shown optimal via new {CLT}s},
author={Valiant, Gregory and Valiant, Paul},
booktitle={Proceedings of the forty-third annual ACM symposium on Theory of computing},
pages={685--694},
year={2011},
organization={ACM}
}
@misc{redacted1,
note = {Citation redacted for blinding purposes.},
}
@inproceedings{wichs2017obfuscating,
title={Obfuscating compute-and-compare programs under lwe},
author={Wichs, Daniel and Zirdelis, Giorgos},
booktitle={2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)},
pages={600--611},
year={2017},
organization={IEEE}
}
@article{regev2009lattices,
title={On lattices, learning with errors, random linear codes, and cryptography},
author={Regev, Oded},
journal={Journal of the ACM (JACM)},
volume={56},
number={6},
pages={34},
year={2009},
publisher={ACM}
}
@inproceedings{zhandry2016magic,
title={The magic of ELFs},
author={Zhandry, Mark},
booktitle={Annual Cryptology Conference},
pages={479--508},
year={2016},
organization={Springer}
}
@inproceedings{valiant2010clt,
title={A {CLT} and tight lower bounds for estimating entropy.},
author={Valiant, Gregory and Valiant, Paul},
booktitle={Electronic Colloquium on Computational Complexity (ECCC)},
volume={17},
number={179},
pages={9},
year={2010}
}
@misc{samsung2017pass,
title={Samsung Pass},
url={http://developer.samsung.com/tech-insights/pass},
Note = {Internet website; accessed 21 September 2017.}
}
@misc{bitcoinhashrate,
title={Bitcoin Difficulty and Hashrate},
retrieved={December 14, 2017},
howpublished={\url{https://bitcoinwisdom.com/bitcoin/difficulty}},
year={2017}
}
@techreport{percival2016scrypt,
title={The scrypt password-based key derivation function},
author={Percival, Colin and Josefsson, Simon},
year={2016}
}
@article{josefsson2015memory,
title={The memory-hard Argon2 password hash function},
author={Josefsson, Simon},
journal={memory},
year={2015}
}
@article{nddataset,
title={{FRVT} 2006 and {ICE} 2006 Large-Scale Experimental Results},
journal={IEEE Transactions on Pattern Analysis and Machine Intelligence},
author={Phillips, P. Jonathan and Scruggs, W. Todd and J. O'Toole, Alice and J. Flynn, Patrick and W. Bowyer, Kevin and L. Schott, Cathy and Sharpe, Matthew},
url={http://doi.ieeecomputersociety.org/10.1109/TPAMI.2009.59},
year={2006}
}
@article{pub1995secure,
title={Secure hash standard},
author={PUB, FIPS},
journal={Public Law},
volume={100},
pages={235},
year={1995}
}
@inproceedings{gafurov2007survey,
title={A survey of biometric gait recognition: Approaches, security and challenges},
author={Gafurov, Davrondzhon},
booktitle={Annual Norwegian computer science conference},
pages={19--21},
year={2007}
}
@inproceedings{van2012reverse,
title={Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for {PUF}-Enabled {RFID}s.},
author={Van Herrewege, Anthony and Katzenbeisser, Stefan and Maes, Roel and Peeters, Roel and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian},
booktitle={Financial Cryptography},
volume={7397},
pages={374--389},
year={2012},
organization={Springer}
}
@inproceedings{delvaux2016efficient,
title={Efficient fuzzy extraction of {PUF}-induced secrets: Theory and applications},
author={Delvaux, Jeroen and Gu, Dawu and Verbauwhede, Ingrid and Hiller, Matthias and Yu, Meng-Day Mandel},
booktitle={International Conference on Cryptographic Hardware and Embedded Systems (CHES)},
pages={412--431},
year={2016},
organization={Springer}
}
@inproceedings{DodisKL09,
author = {Yevgeniy Dodis and
Yael Tauman Kalai and
Shachar Lovett},
title = {On cryptography with auxiliary input},
booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
{STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
pages = {621--630},
year = {2009},
crossref = {DBLP:conf/stoc/2009},
url = {http://doi.acm.org/10.1145/1536414.1536498},
doi = {10.1145/1536414.1536498},
timestamp = {Fri, 05 Jun 2009 09:34:35 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/stoc/DodisKL09},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2009,
editor = {Michael Mitzenmacher},
title = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
{STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
publisher = {{ACM}},
year = {2009},
isbn = {978-1-60558-506-2},
timestamp = {Fri, 05 Jun 2009 09:31:27 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2009},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DF99,
author = {George I. Davida and
Yair Frankel},
title = {Perfectly Secure Authorization and Passive Identification for an Error
Tolerant Biometric System},
booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
UK, December 20-22, 1999, Proceedings},
pages = {104--113},
year = {1999},
crossref = {DBLP:conf/ima/1999},
url = {http://dx.doi.org/10.1007/3-540-46665-7_11},
doi = {10.1007/3-540-46665-7_11},
timestamp = {Mon, 20 Jun 2011 17:29:53 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/ima/DavidaF99},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ima/1999,
editor = {Michael Walker},
title = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
UK, December 20-22, 1999, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {1746},
publisher = {Springer},
year = {1999},
isbn = {3-540-66887-X},
timestamp = {Thu, 03 Jan 2002 12:03:44 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/ima/1999},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{yu2010secure,
title={Secure and Robust Error Correction for Physical Unclonable Functions},
author={Yu, Meng-Day Mandel and Devadas, Srinivas},
journal={IEEE Design \& Test},
volume={27},
number={1},
pages={48--65},
year={2010},
publisher={IEEE Computer Society Press}
}
@incollection{maes2009low,
title={Low-overhead implementation of a soft decision helper data algorithm for {SRAM} {PUF}s},
author={Maes, Roel and Tuyls, Pim and Verbauwhede, Ingrid},
booktitle={Cryptographic Hardware and Embedded Systems-CHES 2009},
pages={332--347},
year={2009},
publisher={Springer}
}
@inproceedings{hiller2012complementary,
title={Complementary IBS: Application specific error correction for {PUF}s},
author={Hiller, Matthias and Merli, Dominik and Stumpf, Frederic and Sigl, Georg},
booktitle={IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)},
pages={1--6},
year={2012},
organization={IEEE}
}
@book{Ash65,
author={Robert Ash},
title={Information Theory},
publisher={Interscience Publishers},
year = 1965,
}
@article{Mau93,
author = {Ueli M. Maurer},
title = {Secret key agreement by public discussion from common information},
journal = {{IEEE} Transactions on Information Theory},
volume = {39},
number = {3},
pages = {733--742},
year = {1993},
url = {http://dx.doi.org/10.1109/18.256484},
doi = {10.1109/18.256484},
timestamp = {Mon, 31 Oct 2011 17:05:16 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/tit/Maurer93},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{MW96,
author = {Ueli M. Maurer and
Stefan Wolf},
title = {Towards Characterizing When Information-Theoretic Secret Key Agreement
Is Possible},
booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
on the Theory and Applications of Cryptology and Information Security,
Kyongju, Korea, November 3-7, 1996, Proceedings},
pages = {196--209},
year = {1996},
crossref = {DBLP:conf/asiacrypt/1996},
url = {http://dx.doi.org/10.1007/BFb0034847},
doi = {10.1007/BFb0034847},
timestamp = {Mon, 12 Oct 2009 15:27:12 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/MaurerW96},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1996,
editor = {Kwangjo Kim and
Tsutomu Matsumoto},
title = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
on the Theory and Applications of Cryptology and Information Security,
Kyongju, Korea, November 3-7, 1996, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {1163},
publisher = {Springer},
year = {1996},
isbn = {3-540-61872-4},
timestamp = {Thu, 03 Jan 2002 11:53:04 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/1996},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{Mau97,
author = {Ueli M. Maurer},
title = {Information-Theoretically Secure Secret-Key Agreement by {NOT} Authenticated
Public Discussion},
booktitle = {Advances in Cryptology - {EUROCRYPT} 1997},
pages = {209--225},
year = {1997},
crossref = {DBLP:conf/eurocrypt/97},
url = {http://dx.doi.org/10.1007/3-540-69053-0_15},
doi = {10.1007/3-540-69053-0_15},
timestamp = {Fri, 23 Dec 2011 14:54:26 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Maurer97},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/97,
editor = {Walter Fumy},
title = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
on the Theory and Application of Cryptographic Techniques, Konstanz,
Germany, May 11-15, 1997, Proceeding},
series = {Lecture Notes in Computer Science},
volume = {1233},
publisher = {Springer},
year = {1997},
isbn = {3-540-62975-0},
timestamp = {Tue, 30 Apr 2002 07:52:08 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/97},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{MW97,
author = {Ueli M. Maurer and
Stefan Wolf},
title = {Privacy Amplification Secure Against Active Adversaries},
booktitle = {Advances in Cryptology - {CRYPTO} 1997},
pages = {307--321},
year = {1997},
crossref = {DBLP:conf/crypto/1997},
url = {http://dx.doi.org/10.1007/BFb0052244},
doi = {10.1007/BFb0052244},
timestamp = {Fri, 18 Sep 2009 11:29:41 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/MaurerW97},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1997,
editor = {Burton S. Kaliski Jr.},
title = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {1294},
publisher = {Springer},
year = {1997},
isbn = {3-540-63384-7},
timestamp = {Thu, 03 Jan 2002 11:55:47 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1997},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{wayman2005introduction,
title={An introduction to biometric authentication systems},
author={Wayman, James and Jain, Anil and Maltoni, Davide and Maio, Dario},
journal={Biometric Systems},
pages={1--20},
year={2005},
publisher={Springer}
}
@inproceedings{C:HolRen05,
author = {Thomas Holenstein and
Renato Renner},
title = {One-Way Secret-Key Agreement and Applications to Circuit Polarization
and Immunization of Public-Key Encryption},
booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
Cryptology Conference, Santa Barbara, California, USA, August 14-18,
2005, Proceedings},
pages = {478--493},
year = {2005},
crossref = {DBLP:conf/crypto/2005},
url = {http://dx.doi.org/10.1007/11535218_29},
doi = {10.1007/11535218_29},
timestamp = {Fri, 04 Nov 2005 09:54:52 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/HolensteinR05},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
editor = {Victor Shoup},
title = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
Cryptology Conference, Santa Barbara, California, USA, August 14-18,
2005, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3621},
publisher = {Springer},
year = {2005},
isbn = {3-540-28114-2},
timestamp = {Fri, 04 Nov 2005 09:54:52 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2005},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{kelkboom2011preventing,
title={Preventing the decodability attack based cross-matching in a fuzzy commitment scheme},
author={Kelkboom, Emile JC and Breebaart, Jeroen and Kevenaar, Tom AM and Buhan, Ileana and Veldhuis, Raymond NJ},
journal={Information Forensics and Security, IEEE Transactions on},
volume={6},
number={1},
pages={107--121},
year={2011},
publisher={IEEE}
}
@inproceedings{bringer2007optimal,
title={Optimal iris fuzzy sketches},
author={Bringer, Julien and Chabanne, Herv{\'e} and Cohen, G{\'e}rard and Kindarji, Bruno and Z{\'e}mor, Gilles},
booktitle={Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE International Conference on},
pages={1--6},
year={2007},
organization={IEEE}
}
@article{itkis2015iris,
title={Iris Biometric Security Challenges and Possible Solutions: For your eyes only? Using the iris as a key},
author={Itkis, Gene and Chandar, Venkat and Fuller, Benjamin W and Campbell, Joseph P and Cunningham, Robert K},
journal={IEEE Signal Processing Magazine},
volume={32},
number={5},
pages={42--53},
year={2015},
publisher={IEEE}
}
@misc{Fuller2018,
author = {Fuller, Benjamin and Simhadri, Sailesh and Steel, James},
title = {Computational Fuzzy Extractors},
year = {2018},
publisher = {GitHub},
journal = {GitHub repository},
howpublished = {\url{https://github.com/benjaminfuller/CompFE}},
commit = {fe9b23c0aa341047fdfb4fc44735461cfadc6248P}
}
@inproceedings{kanade2008three,
title={Three factor scheme for biometric-based cryptographic key regeneration using iris},
author={Kanade, Sanjay and Camara, Danielle and Krichen, Emine and Petrovska-Delacr{\'e}taz, Dijana and Dorizzi, Bernadette},
booktitle={Biometrics Symposium, 2008. BSYM'08},
pages={59--64},
year={2008},
organization={IEEE}
}
@article{patel2015cancelable,
title={Cancelable biometrics: A review},
author={Patel, Vishal M and Ratha, Nalini K and Chellappa, Rama},
journal={IEEE Signal Processing Magazine},
volume={32},
number={5},
pages={54--65},
year={2015},
publisher={IEEE}
}
@inproceedings{komargodski2018another,
title={Another Step Towards Realizing Random Oracles: Non-malleable Point Obfuscation},
author={Komargodski, Ilan and Yogev, Eylon},
booktitle={Advances in Cryptology -- {EUROCRYPT}},
pages={259--279},
year={2018},
organization={Springer}
}
@incollection{bowyer2013survey,
title={A survey of iris biometrics research: 2008--2010},
author={Bowyer, Kevin W and Hollingsworth, Karen P and Flynn, Patrick J},
booktitle={Handbook of iris recognition},
pages={15--54},
year={2013},
publisher={Springer}
}
@inproceedings{guo2016hardware,
title={Hardware security meets biometrics for the age of {IoT}},
author={Guo, Zimu and Karimian, Nima and Tehranipoor, Mark M and Forte, Domenic},
booktitle={Circuits and Systems (ISCAS), 2016 IEEE International Symposium on},
pages={1318--1321},
year={2016},
organization={IEEE}
}
@inproceedings{carter2008implications,
title={Implications of biometric encryption on wide spread use of biometrics},
author={Carter, F and Stoianov, A},
booktitle={EBF Biometric Encryption Seminar (June 2008)},
year={2008}
}
@incollection{cramer2008detection,
title={Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors},
author={Cramer, Ronald and Dodis, Yevgeniy and Fehr, Serge and Padr{\'o}, Carles and Wichs, Daniel},
booktitle={Advances in Cryptology--EUROCRYPT 2008},
pages={471--488},
year={2008},
publisher={Springer}
}
@misc{skoric2009efficient,
author = {B. Skoric and P. Tuyls},
title = {An efficient fuzzy extractor for limited noise},
howpublished = {Cryptology ePrint Archive, Report 2009/030},
year = {2009},
note = {\url{http://eprint.iacr.org/}},
}
%% Created for Benjamin Fuller at 2013-04-03 10:28:01 -0400
@inproceedings{CKVW10,
author = {Ran Canetti and
Yael Tauman Kalai and
Mayank Varia and
Daniel Wichs},
title = {On Symmetric Encryption and Point Obfuscation},
booktitle = {Theory of Cryptography (TCC)},
pages = {52--71},
year = {2010},
url = {http://dx.doi.org/10.1007/978-3-642-11799-2_4},
doi = {10.1007/978-3-642-11799-2_4},
timestamp = {Mon, 08 Feb 2010 21:27:09 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/tcc/CanettiKVW10},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@InProceedings{CanettiVaria2009,
author="Canetti, Ran
and Varia, Mayank",
editor="Reingold, Omer",
title="Non-malleable Obfuscation",
booktitle="Theory of Cryptography",
year="2009",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="73--90",
abstract="Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfuscated) program that is related to the original one in some way.",
isbn="978-3-642-00457-5"
}
@proceedings{DBLP:conf/tcc/2010,
editor = {Daniele Micciancio},
title = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5978},
publisher = {Springer},
year = {2010},
url = {http://dx.doi.org/10.1007/978-3-642-11799-2},
doi = {10.1007/978-3-642-11799-2},
isbn = {978-3-642-11798-5},
timestamp = {Mon, 08 Feb 2010 21:26:00 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2010},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DKKRS12,
author = {Yevgeniy Dodis and
Bhavana Kanukurthi and
Jonathan Katz and
Leonid Reyzin and
Adam Smith},
title = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close
Secrets},
journal = {{IEEE} Transactions on Information Theory},
volume = {58},
number = {9},
pages = {6207--6222},
year = {2012},
url = {http://dx.doi.org/10.1109/TIT.2012.2200290},
doi = {10.1109/TIT.2012.2200290},
timestamp = {Thu, 06 Sep 2012 10:23:00 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/tit/DodisKKRS12},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{koeberl2014entropy,
title={Entropy loss in {PUF}-based key generation schemes: The repetition code pitfall},
author={Koeberl, Patrick and Li, Jiangtao and Rajan, Anand and Wu, Wei},
booktitle={Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on},
pages={44--49},
year={2014},
organization={IEEE}
}
@article{carter1979universal,
title={Universal classes of hash functions},
author={Carter, J Lawrence and Wegman, Mark N},
journal={Journal of computer and system sciences},
volume={18},
number={2},
pages={143--154},
year={1979},
publisher={Elsevier}
}
@inproceedings{bonneau2012quest,
title={The quest to replace passwords: A framework for comparative evaluation of web authentication schemes},
author={Bonneau, Joseph and Herley, Cormac and Van Oorschot, Paul C and Stajano, Frank},
booktitle={IEEE Symposium on Security and Privacy},
pages={553--567},
year={2012},
organization={IEEE}
}
@article{pauleve2010locality,
title={Locality sensitive hashing: A comparison of hash function types and querying mechanisms},
author={Paulev{\'e}, Lo{\"\i}c and J{\'e}gou, Herv{\'e} and Amsaleg, Laurent},
journal={Pattern Recognition Letters},
volume={31},
number={11},
pages={1348--1358},
year={2010},
publisher={Elsevier}
}
@incollection{blanton2009biometric,
title={Biometric-based non-transferable anonymous credentials},
author={Blanton, Marina and Hudelson, William MP},
booktitle={Information and Communications Security},
pages={165--180},
year={2009},
publisher={Springer}
}
@article{blanton2013analysis,
title={Analysis of Reusability of Secure Sketches and Fuzzy Extractors},
author={Blanton, Marina and Aliasgari, Mehrdad},
journal={IEEE transactions on information forensics and security},
volume={8},
number={9-10},
pages={1433--1445},
year={2013},
publisher={Institute of Electrical and Electronics Engineers}
}
@inproceedings{dodis2004fuzzy,
title={Fuzzy extractors: How to generate strong keys from biometrics and other noisy data},
author={Dodis, Yevgeniy and Reyzin, Leonid and Smith, Adam},
booktitle={Advances in Cryptology--Eurocrypt},
pages={523--540},
organization={Springer},
year={2004}
}
@article{DBLP:journals/siamcomp/DodisORS08,
Author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith},
Journal = {SIAM Journal on Computing},
Number = {1},
Pages = {97-139},
Title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data},
Volume = {38},
Year = {2008}}
@article{cohen2014nonmalleable,
title={Nonmalleable extractors with short seeds and applications to privacy amplification},
author={Cohen, Gil and Raz, Ran and Segev, Gil},
journal={SIAM Journal on Computing},
volume={43},
number={2},
pages={450--476},
year={2014},
publisher={SIAM}
}
@inproceedings{boldyreva2009foundations,
title={Foundations of non-malleable hash and one-way functions},
author={Boldyreva, Alexandra and Cash, David and Fischlin, Marc and Warinschi, Bogdan},
booktitle={International Conference on the Theory and Application of Cryptology and Information Security},
pages={524--541},
year={2009},
organization={Springer}
}
@inproceedings{baecher2011expedient,
title={Expedient non-malleability notions for hash functions},
author={Baecher, Paul and Fischlin, Marc and Schr{\"o}der, Dominique},
booktitle={Cryptographers’ Track at the RSA Conference},
pages={268--283},
year={2011},
organization={Springer}
}
@inproceedings{chen2016non,
title={Non-malleable functions and their applications},
author={Chen, Yu and Qin, Baodong and Zhang, Jiang and Deng, Yi and Chow, Sherman SM},
booktitle={IACR International Workshop on Public Key Cryptography},
pages={386--416},
year={2016},
organization={Springer}
}
@article{blanton2012non,
title={On the (Non-) Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting.},
author={Blanton, Marina and Aliasgari, Mehrdad},
journal={IACR Cryptology ePrint Archive},
volume={2012},
pages={608},
year={2012}
}
@inproceedings{simoens2009privacy,
title={Privacy weaknesses in biometric sketches},
author={Simoens, Koen and Tuyls, Pim and Preneel, Bart},
booktitle={IEEE Symposium on Security and Privacy},
pages={188--203},
year={2009},
organization={IEEE}
}
@inproceedings{canetti2016reusable,
title={Reusable fuzzy extractors for low-entropy distributions},
author={Canetti, Ran and Fuller, Benjamin and Paneth, Omer and Reyzin, Leonid and Smith, Adam},
booktitle={Advances in Cryptology--Eurocrypt 2016},
pages={117--146},
year={2016},
organization={Springer}
}
@article{hao2006combining,
title={Combining crypto with biometrics effectively},
author={Hao, Feng and Anderson, Ross and Daugman, John},
journal={IEEE Transactions on Computers},
volume={55},
number={9},
pages={1081--1088},
year={2006},
publisher={IEEE}
}
@inproceedings{gentile2009efficient,
title={An efficient, two-stage iris recognition system},
author={Gentile, James E and Ratha, Nalini and Connell, Jonathan},
booktitle={Biometrics: Theory, Applications, and Systems, 2009},
pages={1--5},
year={2009},
organization={IEEE}
}
@inproceedings{gentile2009slic,
title={{SLIC}: Short-Length Iris Codes},
author={Connell, Jonathan and Gentile, James E and Ratha, Nalini},
booktitle={Biometrics: Theory, Applications, and Systems, 2009},
year={2009}
}
@incollection{rathgeb2011combining,
title={On combining selective best bits of iris-codes},
author={Rathgeb, Christian and Uhl, Andreas and Wild, Peter},
booktitle={Biometrics and ID Management},
pages={227--237},
year={2011},
publisher={Springer}
}
@inproceedings{canetti1998perfectly,
title={Perfectly one-way probabilistic hash functions (preliminary version)},
author={Canetti, Ran and Micciancio, Daniele and Reingold, Omer},
booktitle={Proceedings of the thirtieth annual ACM symposium on Theory of computing},
pages={131--140},
year={1998},
organization={ACM}
}
@article{monrose2002password,
title={Password hardening based on keystroke dynamics},
author={Monrose, Fabian and Reiter, Michael K and Wetzel, Susanne},
journal={International Journal of Information Security},
volume={1},
number={2},
pages={69--83},
year={2002},
publisher={Springer}
}
@article{mayrhofer2009shake,
title={Shake well before use: Intuitive and secure pairing of mobile devices},
author={Mayrhofer, Rene and Gellersen, Hans},
journal={IEEE Transactions on Mobile Computing},
volume={8},
number={6},
pages={792--806},
year={2009},
publisher={IEEE}
}
@article{ellison2000protecting,
title={Protecting secret keys with personal entropy},
author={Ellison, Carl and Hall, Chris and Milbert, Randy and Schneier, Bruce},
journal={Future Generation Computer Systems},
volume={16},
number={4},
pages={311--318},
year={2000},
publisher={Elsevier}
}
@inproceedings{gassend2002silicon,
title={Silicon physical random functions},
author={Gassend, Blaise and Clarke, Dwaine and Van Dijk, Marten and Devadas, Srinivas},
booktitle={Proceedings of the 9th ACM conference on Computer and communications security},
pages={148--160},
year={2002},
organization={ACM}
}
@inproceedings{DBLP:conf/innovations/GoldwasserKPV10,
author = {Shafi Goldwasser and
Yael Tauman Kalai and
Chris Peikert and
Vinod Vaikuntanathan},
title = {Robustness of the Learning with Errors Assumption},
booktitle = {ICS},
year = {2010},
pages = {230-240},
ee = {http://conference.itcs.tsinghua.edu.cn/ICS2010/content/papers/19.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@misc{scala2009hypergeometric,
title={Hypergeometric tail inequalities: ending the insanity},
author={Scala, Matthew},
year={2009},
publisher={Proofs}
}
@article{chvatal1979tail,
title={The tail of the hypergeometric distribution},
author={Chv{\'a}tal, Va{\v{s}}ek},
journal={Discrete Mathematics},
volume={25},
number={3},
pages={285--287},
year={1979},
publisher={North-Holland}
}
@inproceedings{apon2017efficient,
title={Efficient, Reusable Fuzzy Extractors from {LWE}},
author={Apon, Daniel and Cho, Chongwon and Eldefrawy, Karim and Katz, Jonathan},
booktitle={International Conference on Cyber Security Cryptography and Machine Learning},
pages={1--18},
year={2017},
organization={Springer}
}
@inproceedings{alamelou2018pseudoentropic,
title={Pseudoentropic isometries: A new framework for fuzzy extractor reusability},
author={Alam{\'e}lou, Quentin and Berthier, Paul-Edmond and Cachet, Chlo{\'e} and Cauchie, St{\'e}phane and Fuller, Benjamin and Gaborit, Philippe and Simhadri, Sailesh},
year={2018},
available={https://eprint.iacr.org/2016/1100},
booktitle={AsiaCCS}
}
@article{prabhakar2003biometric,
title={Biometric recognition: Security and privacy concerns},
author={Prabhakar, Salil and Pankanti, Sharath and Jain, Anil K},
journal={IEEE Security \& Privacy},
volume={1},
number={2},
pages={33--42},
year={2003},
publisher={IEEE}
}
@article{grossmann1984decomposition,
title={Decomposition of {H}ardy functions into square integrable wavelets of constant shape},
author={Grossmann, Alexander and Morlet, Jean},
journal={SIAM journal on mathematical analysis},
volume={15},
number={4},
pages={723--736},
year={1984},
publisher={SIAM}
}
@article{o2003comparing,
title={Comparing passwords, tokens, and biometrics for user authentication},
author={O'Gorman, Lawrence},
journal={Proceedings of the IEEE},
volume={91},
number={12},
pages={2021--2040},
year={2003},
publisher={IEEE}
}
@article{ratha2003biometrics,
title={Biometrics break-ins and band-aids},
author={Ratha, Nalini K and Connell, Jonathan H and Bolle, Ruud M},
journal={Pattern Recognition Letters},
volume={24},
number={13},
pages={2105--2113},
year={2003},
publisher={Elsevier}
}
@article{jain2008biometric,
title={Biometric template security},
author={Jain, Anil K and Nandakumar, Karthik and Nagar, Abhishek},
journal={EURASIP Journal on Advances in Signal Processing},
volume={2008},
pages={113},
year={2008},
publisher={Hindawi Publishing Corp.}
}
@incollection{goldreich2011sample,
title={A sample of samplers: A computational perspective on sampling},
author={Goldreich, Oded},
booktitle={Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation},
pages={302--332},
year={2011},
publisher={Springer}
}
@incollection{lu2002hyper,
title={Hyper-encryption against space-bounded adversaries from on-line strong extractors},
author={Lu, Chi-Jen},
booktitle={Advances in Cryptology-—CRYPTO 2002},
pages={257--271},
year={2002},
publisher={Springer}
}
@incollection{vadhan2003constructing,
title={On constructing locally computable extractors and cryptosystems in the bounded storage model},
author={Vadhan, Salil P},
booktitle={Advances in Cryptology-CRYPTO 2003},
pages={61--77},
year={2003},
publisher={Springer}
}
@inproceedings{tallini2002capacity,
title={On the capacity and codes for the {Z}-channel},
author={Tallini, Luca G and Al-Bassam, Sulaiman and Bose, Bella},
booktitle={IEEE International Symposium on Information Theory},
pages={422},
year={2002}
}
@article{gilbert1960capacity,
title={Capacity of a burst-noise channel},
author={Gilbert, Edgar N},
journal={Bell Syst. Tech. J},
volume={39},
number={9},
pages={1253--1265},
year={1960}
}
@article{pappu2002physical,
title={Physical one-way functions},
author={Pappu, Ravikanth and Recht, Ben and Taylor, Jason and Gershenfeld, Neil},
journal={Science},
volume={297},
number={5589},
pages={2026--2030},
year={2002},
publisher={American Association for the Advancement of Science}
}
@article{hoeffding1963probability,
title={Probability inequalities for sums of bounded random variables},
author={Hoeffding, Wassily},
journal={Journal of the American statistical association},
volume={58},
number={301},
pages={13--30},
year={1963},
publisher={Taylor \& Francis Group}
}
@article{justesen1972class,
title={Class of constructive asymptotically good algebraic codes},
author={Justesen, J{\o}rn},
journal={Information Theory, IEEE Transactions on},
volume={18},
number={5},
pages={652--656},
year={1972},
publisher={IEEE}
}
@article{gallager1962low,
title={Low-density parity-check codes},
author={Gallager, Robert},
journal={Information Theory, IRE Transactions on},
volume={8},
number={1},
pages={21--28},
year={1962},
publisher={IEEE}
}
@incollection{bitansky2010strong,
title={On strong simulation and composable point obfuscation},
author={Bitansky, Nir and Canetti, Ran},
booktitle={Advances in Cryptology--CRYPTO 2010},
pages={520--537},
year={2010},
publisher={Springer}
}
@incollection{canetti2008obfuscating,
title={Obfuscating point functions with multibit output},
author={Canetti, Ran and Dakdouk, Ronny Ramzi},
booktitle={Advances in Cryptology--EUROCRYPT 2008},
pages={489--508},
year={2008},
publisher={Springer}
}
@inproceedings{lynn2004positive,
title={Positive results and techniques for obfuscation},
author={Lynn, Benjamin and Prabhakaran, Manoj and Sahai, Amit},
booktitle={Advances in Cryptology--EUROCRYPT 2004},
pages={20--39},
year={2004},
organization={Springer}
}
@inproceedings{chattopadhyay2017non,
title={Non-malleable codes and extractors for small-depth circuits, and affine functions},
author={Chattopadhyay, Eshan and Li, Xin},
booktitle={Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing},
pages={1171--1184},
year={2017},
organization={ACM}
}
@inproceedings{goldwasser2005impossibility,
title={On the impossibility of obfuscation with auxiliary input},
author={Goldwasser, Shafi and Kalai, Yael Tauman},
booktitle={Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on},
pages={553--562},
year={2005},
organization={IEEE}
}
@incollection{goldwasser2007best,
title={On best-possible obfuscation},
author={Goldwasser, Shafi and Rothblum, Guy N},
booktitle={Theory of Cryptography},
pages={194--213},
year={2007},
publisher={Springer}
}
@incollection{garg2013multilinear,
title={Candidate multilinear maps from ideal lattices},
author={Garg, Sanjam and Gentry, Craig and Halevi, Shai},
booktitle={Advances in Cryptology--EUROCRYPT 2013},
pages={1--17},
year={2013},
publisher={Springer}
}
@phdthesis{dakdoukThesis,
title={Theory and Application of Extractable Functions},
author={Ramzi Ronny Dakdouk},
year={2009},
school={Yale University},
note={\url{http://www.cs.yale.edu/homes/jf/Ronny-thesis.pdf}}
}
@phdthesis{varia2010studies,
title={Studies in program obfuscation},
author={Varia, Mayank Harshad},
year={2010},
school={Massachusetts Institute of Technology}
}
@incollection{canetti1997towards,
title={Towards realizing random oracles: Hash functions that hide all partial information},
author={Canetti, Ran},
booktitle={Advances in Cryptology-—CRYPTO'97},
pages={455--469},
year={1997},
publisher={Springer}
}
@inproceedings{wee2005obfuscating,
title={On obfuscating point functions},
author={Wee, Hoeteck},
booktitle={Proceedings of the thirty-seventh annual ACM symposium on Theory of computing},
pages={523--532},
year={2005},
organization={ACM}
}
@inproceedings{barak2001possibility,
title={On the (im) possibility of obfuscating programs},
author={Barak, Boaz and Goldreich, Oded and Impagliazzo, Rusell and Rudich, Steven and Sahai, Amit and Vadhan, Salil and Yang, Ke},
booktitle={Advances in Cryptology--{CRYPTO}},
pages={1--18},
year={2001},
organization={Springer}
}
@incollection{fuller2013computational,
title={Computational fuzzy extractors},
author={Fuller, Benjamin and Meng, Xianrui and Reyzin, Leonid},
booktitle={Advances in Cryptology--{ASIACRYPT}},
pages={174--193},
year={2013},
publisher={Springer}
}
@inproceedings{fuller2016fuzzy,
title={When are fuzzy extractors possible?},
author={Fuller, Benjamin and Reyzin, Leonid and Smith, Adam},
booktitle={Advances in Cryptology--{ASIACRYPT}},
pages={277--306},
year={2016},
organization={Springer}
}
@inproceedings{brakerski2013classical,
title={Classical hardness of learning with errors},
author={Brakerski, Zvika and Langlois, Adeline and Peikert, Chris and Regev, Oded and Stehl{\'e}, Damien},
booktitle={Proceedings of the 45th annual ACM symposium on Symposium on theory of computing},
pages={575--584},
year={2013},
organization={ACM}
}
@book{Vad12,
author={Salil Vadhan},
title={Pseudorandomness},
series={Foundations and Trends in Theoretical Computer Science},
publisher = {Now Publishers},
year = {2012}
}
@incollection{dodis2014key,
title={Key derivation without entropy waste},
author={Dodis, Yevgeniy and Pietrzak, Krzysztof and Wichs, Daniel},
booktitle={Advances in Cryptology--EUROCRYPT 2014},
pages={93--110},
year={2014},
publisher={Springer}
}
@incollection{barak2011leftover,
title={Leftover hash lemma, revisited},
author={Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, Fran{\c{c}}ois-Xavier and Yu, Yu},
booktitle={Advances in Cryptology--CRYPTO 2011},
pages={1--20},
year={2011},
publisher={Springer}
}
@incollection{dachman2012computational,
title={Computational extractors and pseudorandomness},
author={Dachman-Soled, Dana and Gennaro, Rosario and Krawczyk, Hugo and Malkin, Tal},
booktitle={Theory of Cryptography},
pages={383--403},
year={2012},
publisher={Springer}
}
@incollection{krawczyk2010cryptographic,
title={Cryptographic extraction and key derivation: The {HKDF} scheme},
author={Krawczyk, Hugo},
booktitle={Advances in Cryptology--CRYPTO 2010},
pages={631--648},
year={2010},
publisher={Springer}
}
@incollection{reyzin2011some,
title={Some notions of entropy for cryptography},
author={Reyzin, Leonid},
booktitle={Information Theoretic Security},
pages={138--142},
year={2011},
publisher={Springer}
}
@article{diffie1976new,
title={New directions in cryptography},
author={Diffie, Whitfield and Hellman, Martin},
journal={IEEE transactions on Information Theory},
volume={22},
number={6},
pages={644--654},
year={1976},
publisher={IEEE}
}
@proceedings{DBLP:conf/eurocrypt/2013,
editor = {Thomas Johansson and
Phong Q. Nguyen},
title = {Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, Athens, Greece, May 26-30, 2013. Proceedings},
booktitle = {EUROCRYPT},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7881},
year = {2013},
isbn = {978-3-642-38347-2, 978-3-642-38348-9},
ee = {http://dx.doi.org/10.1007/978-3-642-38348-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{nisan1993randomness,
title={Randomness is linear in space},
author={Nisan, Noam and Zuckerman, David},
booktitle={Symposium on Theory of Computing},
pages={235--244},
year={1993}
}
@inproceedings{dodis2009non,
title={Non-malleable extractors and symmetric key cryptography from weak secrets},
author={Dodis, Yevgeniy and Wichs, Daniel},
booktitle={Proceedings of the forty-first annual ACM symposium on Theory of computing},
pages={601--610},
year={2009},
organization={ACM}
}
@inproceedings{pass2014indistinguishability,
title={Indistinguishability obfuscation from semantically-secure multilinear encodings},
author={Pass, Rafael and Seth, Karn and Telang, Sidharth},
booktitle={Advances in Cryptology -- {CRYPTO}},
pages={500--517},
year={2014},
organization={Springer}
}
@inproceedings{gentry2015indistinguishability,
title={Indistinguishability obfuscation from the multilinear subgroup elimination assumption},
author={Gentry, Craig and Lewko, Allison Bishop and Sahai, Amit and Waters, Brent},
booktitle={2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS)},
pages={151--170},
year={2015},
organization={IEEE}
}
@inproceedings{ananth2015indistinguishability,
title={Indistinguishability obfuscation from compact functional encryption},
author={Ananth, Prabhanjan and Jain, Abhishek},
booktitle={Advances in Cryptology -- {CRYPTO}},
pages={308--326},
year={2015},
organization={Springer}
}
@incollection{brakerski2014virtual,
title={Virtual black-box obfuscation for all circuits via generic graded encoding},
author={Brakerski, Zvika and Rothblum, Guy N},
booktitle={Theory of Cryptography},
pages={1--25},
year={2014},
publisher={Springer}
}
@incollection{barak2014protecting,
title={Protecting obfuscation against algebraic attacks},
author={Barak, Boaz and Garg, Sanjam and Kalai, Yael Tauman and Paneth, Omer and Sahai, Amit},
booktitle={Advances in Cryptology--EUROCRYPT 2014},
pages={221--238},
year={2014},
publisher={Springer}
}
@inproceedings{BarakBCKPS13,
author = {Boaz Barak and
Nir Bitansky and
Ran Canetti and
Yael Tauman Kalai and
Omer Paneth and
Amit Sahai},
title = {Obfuscation for Evasive Functions},
booktitle = {TCC},
year = {2014},
pages = {26-51},
ee = {http://dx.doi.org/10.1007/978-3-642-54242-8_2},
crossref = {DBLP:conf/tcc/2014},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/tcc/2014,
editor = {Yehuda Lindell},
title = {Theory of Cryptography - 11th Theory of Cryptography Conference,
TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
booktitle = {TCC},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8349},
year = {2014},
isbn = {978-3-642-54241-1},
ee = {http://dx.doi.org/10.1007/978-3-642-54242-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@misc{PassTS13,
author = {Rafael Pass and Karn Seth and Sidharth Telang},
title = {Obfuscation from Semantically-Secure Multi-linear Encodings},
howpublished = {Cryptology ePrint Archive, Report 2013/781},
year = {2013},
note = {\url{http://eprint.iacr.org/}},
}
@inproceedings{BitanskyCKP14,
author = {Nir Bitansky and
Ran Canetti and
Yael Tauman Kalai and
Omer Paneth},
title = {On Virtual Grey Box Obfuscation for General Circuits},
booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
year = {2014},
url = {http://dx.doi.org/10.1007/978-3-662-44381-1_7},
}