Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2008.09317
Cited By
Indistinguishability Obfuscation from Well-Founded Assumptions
21 August 2020
Aayush Jain
Huijia Lin
A. Sahai
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Indistinguishability Obfuscation from Well-Founded Assumptions"
24 / 24 papers shown
Title
Near-Optimal Time-Sparsity Trade-Offs for Solving Noisy Linear Equations
Kiril Bangachev
Guy Bresler
Stefan Tiegel
Vinod Vaikuntanathan
96
3
0
19 Nov 2024
How to Delete Without a Trace: Certified Deniability in a Quantum World
Alper Çakan
Vipul Goyal
Justin Raizes
87
1
0
07 Nov 2024
On the Hardness of Learning One Hidden Layer Neural Networks
Shuchen Li
Ilias Zadik
Manolis Zampetakis
53
2
0
04 Oct 2024
Backdoor defense, learnability and obfuscation
Paul Christiano
Jacob Hilton
Victor Lecomte
Mark Xu
AAML
50
1
0
04 Sep 2024
Quartic quantum speedups for planted inference
Alexander Schmidhuber
Ryan O'Donnell
Robin Kothari
Ryan Babbush
70
2
0
27 Jun 2024
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
Tianyang Chen
Peng Xu
S. Picek
Bo Luo
W. Susilo
Hai Jin
K. Liang
FedML
52
15
0
22 Mar 2024
Private PAC Learning May be Harder than Online Learning
Mark Bun
Aloni Cohen
Rathin Desai
46
2
0
16 Feb 2024
Lossy Cryptography from Code-Based Assumptions
Quang Dao
Aayush Jain
56
6
0
06 Feb 2024
Quantum Cheques
Mohammed Barhoush
L. Salvail
80
0
0
29 Jan 2024
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
51
0
0
08 Oct 2023
Quantum Money from Abelian Group Actions
Mark Zhandry
74
8
0
22 Jul 2023
How to Sign Quantum Messages
Mohammed Barhoush
L. Salvail
136
4
0
13 Apr 2023
Obfuscation of Pseudo-Deterministic Quantum Circuits
James Bartusek
Fuyuki Kitagawa
Ryo Nishimaki
Takashi Yamakawa
UQCV
75
16
0
22 Feb 2023
Towards Separating Computational and Statistical Differential Privacy
Badih Ghazi
Rahul Ilango
Pritish Kamath
Ravi Kumar
Pasin Manurangsi
54
5
0
31 Dec 2022
Use of Cryptography in Malware Obfuscation
Hassan Jameel Asghar
Benjamin Zi Hao Zhao
Muhammad Ikram
Giang Nguyen
Dali Kaafar
Sean Lamont
Daniel Coscia
50
11
0
07 Dec 2022
Functional Encryption with Secure Key Leasing
Fuyuki Kitagawa
Ryo Nishimaki
46
7
0
27 Sep 2022
Indistinguishability Obfuscation of Circuits and its Application in Security
Shilun Li
Zijing Di
23
0
0
28 Jun 2022
One Picture is Worth a Thousand Words: A New Wallet Recovery Process
H. Chabanne
Vincent Despiegel
Linda Guiga
66
0
0
05 May 2022
Quantum Prudent Contracts with Applications to Bitcoin
Or Sattath
MQ
79
1
0
27 Apr 2022
Planting Undetectable Backdoors in Machine Learning Models
S. Goldwasser
Michael P. Kim
Vinod Vaikuntanathan
Or Zamir
AAML
62
73
0
14 Apr 2022
Minimax Optimality (Probably) Doesn't Imply Distribution Learning for GANs
Sitan Chen
Jungshian Li
Yuanzhi Li
Raghu Meka
GAN
73
5
0
18 Jan 2022
Deniable Encryption in a Quantum World
Andrea Coladangelo
S. Goldwasser
Umesh V. Vazirani
90
11
0
30 Dec 2021
Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Jiyi Zhang
Hansheng Fang
W. Tann
Ke Xu
Chengfang Fang
E. Chang
AAML
79
3
0
30 Nov 2021
Spoofing Generalization: When Can't You Trust Proprietary Models?
Ankur Moitra
Elchanan Mossel
Colin Sandon
FedML
40
2
0
15 Jun 2021
1