@inproceedings{2dc75d3622e040faad66808f355321b2,
title = "Bootstrapping obfuscators via fast pseudorandom functions",
abstract = "We show that it is possible to upgrade an obfuscator for a weak complexity class WEAK into an obfuscator for arbitrary polynomial size circuits, assuming that the class WEAK can compute pseudorandom functions. Specifically, under standard intractability assumptions (e.g., hardness of factoring, Decisional Diffie-Hellman, or Learning with Errors), the existence of obfuscators for NC1 or even TC0 implies the existence of general-purpose obfuscators for P. Previously, such a bootstrapping procedure was known to exist under the assumption that there exists a fully-homomorphic encryption whose decryption algorithm can be computed in WEAK. Our reduction works with respect to virtual black-box obfuscators and relativizes to ideal models.",
author = "Benny Applebaum",
note = "Publisher Copyright: {\textcopyright} International Association for Cryptologic Research 2014.; 20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014 ; Conference date: 07-12-2014 Through 11-12-2014",
year = "2014",
doi = "10.1007/978-3-662-45608-8_9",
language = "الإنجليزيّة",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "162--172",
editor = "Palash Sarkar and Tetsu Iwata",
booktitle = "Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II",
address = "ألمانيا",
}