{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:36:28Z","timestamp":1761676588727,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["W911NF-15-C-0227"],"award-info":[{"award-number":["W911NF-15-C-0227"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133983","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"747-764","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["5Gen-C"],"prefix":"10.1145","author":[{"given":"Brent","family":"Carmer","sequence":"first","affiliation":[{"name":"Oregon State University &amp; Galois, Inc., Portland, OR, USA"}]},{"given":"Alex J.","family":"Malozemoff","sequence":"additional","affiliation":[{"name":"Galois, Inc., Portland, OR, USA"}]},{"given":"Mariana","family":"Raykova","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_15"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_6"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_9"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_21"},{"volume-title":"Algebraic attacks against random local functions and their countermeasures 48th ACM STOC","author":"Applebaum Benny","key":"e_1_3_2_2_6_1","unstructured":"Benny Applebaum and Shachar Lovett 2016. Algebraic attacks against random local functions and their countermeasures 48th ACM STOC, Daniel Wichs and Yishay Mansour (Eds.). ACM Press, 1087--1100."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_2"},{"key":"e_1_3_2_2_8_1","volume-title":"Kothari","author":"Barak Boaz","year":"2017","unstructured":"Boaz Barak, Zvika Brakerski, Ilan Komargodski, and Pravesh K. Kothari 2017. Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation). Cryptology ePrint Archive, Report 2017\/312. (2017). shownotehttp:\/\/eprint.iacr.org\/2017\/312."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_13"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.20"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Robert Brayton and Alan Mishchenko 2010. ABC: An Academic Industrial-strength Verification Tool CAV.","DOI":"10.1007\/978-3-642-14295-6_5"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_5"},{"key":"e_1_3_2_2_16_1","volume-title":"van Oorschot","author":"Chow Stanley","year":"2003","unstructured":"Stanley Chow, Philip A. Eisen, Harold Johnson, and Paul C. van Oorschot 2003. White-Box Cryptography and an AES Implementation SAC 2002 (LNCS), Kaisa Nyberg and Howard M. Heys (Eds.), Vol. Vol. 2595. Springer, Heidelberg, 250--270."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_12"},{"key":"e_1_3_2_2_18_1","volume-title":"Tancr\u00e8de Lepoint, and Mehdi Tibouchi","author":"Coron Jean-S\u00e9bastien","year":"2017","unstructured":"Jean-S\u00e9bastien Coron, Moon Sung Lee, Tancr\u00e8de Lepoint, and Mehdi Tibouchi 2017. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 PKC 2017, Part I (LNCS), Serge Fehr (Ed.), Vol. Vol. 10174. Springer, Heidelberg, 41--58."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"e_1_3_2_2_20_1","volume-title":"SAW: The Software Analysis Workbench.","author":"Galois","year":"2016","unstructured":"Galois, Inc. 2016. SAW: The Software Analysis Workbench. (2016). https:\/\/saw.galois.com\/"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_1"},{"volume-title":"Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits 54th FOCS","author":"Garg Sanjam","key":"e_1_3_2_2_22_1","unstructured":"Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. 2013. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits 54th FOCS. IEEE Computer Society Press, 40--49."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_10"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_32"},{"volume-title":"Implementing BP-Obfuscation using Graph-induced Encoding ACM CCS 17","author":"Halevi Shai","key":"e_1_3_2_2_27_1","unstructured":"Shai Halevi, Tzipora Halevi, Victor Shoup, and Noah Stephens-Davidowitz 2017. Implementing BP-Obfuscation using Graph-induced Encoding ACM CCS 17."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382278"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978314"},{"key":"e_1_3_2_2_30_1","volume-title":"Lewis and Brad Martin","author":"Jeffrey","year":"2003","unstructured":"Jeffrey R. Lewis and Brad Martin 2003. Cryptol: High Assurance, Retargetable Crypto Development and Validation IEEE MILCOM'03, Vol. Vol. 2. 820--825."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_2"},{"key":"e_1_3_2_2_32_1","volume-title":"Indistinguishability Obfuscation from SXDH on 5-linear Maps and Locality-5 PRGs CRYPTO","author":"Lin Huijia","year":"2017","unstructured":"Huijia Lin. 2017. Indistinguishability Obfuscation from SXDH on 5-linear Maps and Locality-5 PRGs CRYPTO 2017."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_5"},{"key":"e_1_3_2_2_34_1","volume-title":"Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs CRYPTO","author":"Lin Huijia","year":"2017","unstructured":"Huijia Lin and Stefano Tessaro 2017. Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs CRYPTO 2017."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.11"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Benjamin Mood Debayan Gupta Henry Carter Kevin Butler and Patrick Traynor 2016. Frigate: A Validated Extensible and Efficient Compiler and Interpreter for Secure Computation EuroS&P.","DOI":"10.1109\/EuroSP.2016.20"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Ryan O'Donnell and David Witmer 2014. Goldreich's PRG: Evidence for Near-optimal Polynomial Stretch CCC.","DOI":"10.1109\/CCC.2014.9"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_1"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_3_2_2_40_1","volume-title":"Faster Secure Two-Party Computation in the Single-Execution Setting EUROCRYPT","author":"Wang Xiao","year":"2017","unstructured":"Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2017. Faster Secure Two-Party Computation in the Single-Execution Setting EUROCRYPT 2017, Part II (LNCS), Jean-S\u00e9bastien Coron and Jesper Buus Nielsen (Eds.), Vol. Vol. 10211. Springer, Heidelberg, 399--424."},{"key":"e_1_3_2_2_41_1","unstructured":"Clifford Wolf Johann Glaser and Johannes Kepler. 2013. Yosys - a Free Verilog Synthesis Suite. In Austrochip."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_15"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133983","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133983"}},"subtitle":["Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":40,"alternative-id":["10.1145\/3133956.3133983","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133983","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}