Lower Bounds on Obfuscation from All or Nothing Encryption
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a presentation from Crypto 2017 on lower bounds for obfuscation derived from all-or-nothing encryption. Delve into the paper by Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed as they discuss key assumptions for indistinguishability obfuscation, the nature of all-or-nothing constructs, and blackbox implementations. Examine high-level concepts, the definition of idealized oracles and decryption processes, and the role of hidden queries in this cryptographic research. Gain insights into cutting-edge obfuscation techniques and their theoretical foundations in this 21-minute talk that covers introduction, assumptions, constructions, and a comprehensive summary of findings.
Syllabus
Introduction
What assumptions could give us IO
Allornothing nature
Blackbox construction
Highlevel ideas
Defining idealized Oracle
Defining decryption
Hidden Queries
Summary
Taught by
TheIACR
Related Courses
Save and Load Files with C# in UnityCoursera Project Network via Coursera Reverse Engineering 6: Reversing .NET with dnSpy
Udemy Reverse Engineering & Malware Analysis of .NET & Java
Udemy JavaScript: Security Essentials
LinkedIn Learning TypeScript Crash Course with Matt Pocock
Visual Studio Code via YouTube