@article{GaneshCR12,
  author    = {Vijay Ganesh and
               Michael Carbin and
               Martin C. Rinard},
  title     = {Cryptographic Path Hardening: Hiding Vulnerabilities in
               Software through Cryptography},
  journal   = {CoRR},
  volume    = {abs/1202.0359},
  year      = {2012},
  ee        = {http://arxiv.org/abs/1202.0359},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@misc{CV13,
    author = {Ran Canetti and Vinod Vaikuntanathan},
    title = {Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups},
    howpublished = {Cryptology ePrint Archive, Report 2013/500},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}

@article{BlumM84,
  author    = {Manuel Blum and
               Silvio Micali},
  title     = {How to Generate Cryptographically Strong Sequences of Pseudo-Random
               Bits},
  journal   = {SIAM J. Comput.},
  volume    = {13},
  number    = {4},
  year      = {1984},
  pages     = {850-864},
}

@article{HSW13,
    author = {Susan Hohenberger and Amit Sahai and Brent Waters},
    title = {Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2013},
  pages = {509},
  year      = {2013},
}

@inproceedings{SahaiW13,
  author    = {Amit Sahai and
               Brent Waters},
  title     = {How to Use Indistinguishability Obfuscation: Deniable Encryption,
               and More},
  booktitle = {STOC},
    ee        = {http://eprint.iacr.org/2013/454},
  year      = {2014}
}

@inproceedings{GargGHRSW13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Mariana Raykova and
               Amit Sahai and
               Brent Waters},
  title     = {Candidate Indistinguishability Obfuscation and Functional
               Encryption for all circuits},
  booktitle = {FOCS},
  year      = {2013},
}

@inproceedings{BrakerskyR13,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Obfuscating Conjunctions},
  booktitle = {CRYPTO},
  year      = {2013},
  pages     = {416-434},
  ee        = {http://dx.doi.org/10.1007/978-3-642-40084-1_24},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{ChorG88,
  author    = {Benny Chor and
               Oded Goldreich},
  title     = {Unbiased Bits from Sources of Weak Randomness and Probabilistic
               Communication Complexity},
  journal   = {SIAM J. Comput.},
  volume    = {17},
  number    = {2},
  year      = {1988},
  pages     = {230-261},
  ee        = {http://dx.doi.org/10.1137/0217015},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{HILL99,
  author    = {Johan H{\aa}stad and
               Russell Impagliazzo and
               Leonid A. Levin and
               Michael Luby},
  title     = {A Pseudorandom Generator from any One-way Function},
  journal   = {SIAM J. Comput.},
  volume    = {28},
  number    = {4},
  year      = {1999},
  pages     = {1364-1396},
}

@article{
ChungPS12,
 author    = {Kai-Min Chung and Rafael Pass and Karn Seth },
 title     = {Non-Black-Box Simulation from One-Way Functions
And Applications to Resettable Security
},
  journal   = {IACR Cryptology ePrint Archive},
  year      = {2013},
  ee        = {http://eprint.iacr.org/2013/008},
}
%

@inproceedings{CD09,
  author    = {Ran Canetti and
               Ronny Ramzi Dakdouk},
  title     = {Towards a Theory of Extractable Functions},
  booktitle = {TCC},
  year      = {2009},
  pages     = {595-613},
  ee        = {http://dx.doi.org/10.1007/978-3-642-00457-5_35},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
%
%
@inproceedings{Naor03,
  author    = {Moni Naor},
  title     = {On Cryptographic Assumptions and Challenges},
  booktitle = {Proceedings of the 23rd Annual International Cryptology Conference},
  year      = {2003},
  pages     = {96--109},
}
@inproceedings{CD08,
  author    = {Canetti, Ran and Dakdouk, Ronny Ramzi},
  title     = {Extractable Perfectly One-Way Functions},
  booktitle = {Proceedings of the 35th International Colloquium on Automata, Languages and Programming},
  year      = {2008},
  pages     = {449--460},
}
%
@inproceedings{BCCT12,
  author    = { Nir Bitansky and Ran Canetti and Alessandro Chiesa and  Eran Tromer},
  title     = {From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again},
  booktitle = {Proceedings of the 3rd Innovations in Theoretical Computer Science Conference},
  series    = {ITCS~'12},
  year      = {2012},
  pages     = {326--349},
}
%
%@article{
%BitanskyP12b,
% author    = {Nir Bitansky and Omer Paneth},
% title     = {On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography}
%},
%  journal   = {IACR Cryptology ePrint Archive},
%  year      = {2012},
%  ee        = {http://eprint.iacr.org/2012/729},
%}
%%

@inproceedings{OstrovskyS07,
  author    = {Rafail Ostrovsky and
               William E. Skeith III},
  title     = {A Survey of Single-Database Private Information Retrieval:
               Techniques and Applications},
  booktitle = {Public Key Cryptography},
  year      = {2007},
  pages     = {393-411},
  ee        = {http://dx.doi.org/10.1007/978-3-540-71677-8_26},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{
ChungP13,
 author    = {Kai-Min Chung and Rafael Pass},
 title     = {Simulteneous Resettable WI from One-Way Functions
},
  journal   = {IACR Cryptology ePrint Archive},
  year      = {2013},
  ee        = {http://eprint.iacr.org/2013/010},
}
%

@article{Naor91,
  author    = {Moni Naor},
  title     = {Bit Commitment Using Pseudorandomness},
  journal   = {J. Cryptology},
  volume    = {4},
  number    = {2},
  year      = {1991},
  pages     = {151-158},
  ee        = {http://dx.doi.org/10.1007/BF00196774},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{Blum81,
  author    = {Blum, Manuel},
  title     = {Coin Flipping by Telephone},
  booktitle = {Proceedings of the 18th Annual International Cryptology Conference},
  year      = {1981},
  pages     = {11-15}
}
%
%
@inproceedings{BitanskyC10,
  author    = {Nir Bitansky and
               Ran Canetti},
  title     = {On Strong Simulation and Composable Point Obfuscation},
  booktitle = {CRYPTO},
  year      = {2010},
  pages     = {520-537},
  ee        = {http://dx.doi.org/10.1007/978-3-642-14623-7_28},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

%
@inproceedings{RichardsonK99,
  author    = {Ransom Richardson and
               Joe Kilian},
  title     = {On the Concurrent Composition of Zero-Knowledge Proofs},
  booktitle = {EUROCRYPT},
  year      = {1999},
  pages     = {415-431},
  ee        = {http://dx.doi.org/10.1007/3-540-48910-X_29},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

%
@article{FeigeS89,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {Zero Knowledge Proofs of Knowledge in Two Rounds},
  booktitle = {CRYPTO},
  year      = {1989},
  pages     = {526-544},
}
%
@inproceedings{Kilian92,
  author    = {Kilian, Joe},
  title     = {A note on efficient zero-knowledge proofs and arguments},
  booktitle = {Proceedings of the 24th Annual ACM Symposium on Theory of Computing},
  year      = {1992},
  pages     = {723--732},
}

@inproceedings{HMS07,
  author    = {Dennis Hofheinz and
               John Malone-Lee and
               Martijn Stam},
  title     = {Obfuscation for Cryptographic Purposes},
  booktitle = {TCC},
  year      = {2007},
  pages     = {214-232},
  ee        = {http://dx.doi.org/10.1007/978-3-540-70936-7_12},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{HRSV07,
  author    = {Susan Hohenberger and
               Guy N. Rothblum and
               Abhi Shelat and
               Vinod Vaikuntanathan},
  title     = {Securely Obfuscating Re-encryption},
  booktitle = {TCC},
  year      = {2007},
  pages     = {233-252},
  ee        = {http://dx.doi.org/10.1007/978-3-540-70936-7_13},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


%
@inproceedings{GR07,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {On Best-Possible Obfuscation},
  booktitle = {TCC},
  year      = {2007},
  pages     = {194-213},
  ee        = {http://dx.doi.org/10.1007/978-3-540-70936-7_11},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


%
@inproceedings{AW07,
  author    = {Ben Adida and
               Douglas Wikstr{\"o}m},
  title     = {How to Shuffle in Public},
  booktitle = {TCC},
  year      = {2007},
  pages     = {555-574},
  ee        = {http://dx.doi.org/10.1007/978-3-540-70936-7_30},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

%
@inproceedings{GL,
 author = {Goldreich, O. and Levin, L. A.},
 title = {A hard-core predicate for all one-way functions},
 booktitle = {STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing},
 year = {1989},
 isbn = {0-89791-307-8},
 pages = {25--32},
 location = {Seattle, Washington, United States},
 doi = {http://doi.acm.org/10.1145/73007.73010},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
%
@inproceedings{FeigeS90,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {Witness Indistinguishable and Witness Hiding Protocols},
  booktitle = {STOC},
  year      = {1990},
  pages     = {416-426},
  ee        = {http://doi.acm.org/10.1145/100216.100272},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{MoranR13,
  author    = {Tal Moran and
               Alon Rosen},
  title     = {There is no Indistinguishability Obfuscation in Pessiland},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2013},
  year      = {2013},
  pages     = {643},
  ee        = {http://eprint.iacr.org/2013/643},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{NiuLLT14,
  author    = {Qihua Niu and Hongda Li and Bei Liang and Fei Tang},
  title     = {One-Round Witness Indistinguishability from Indistinguishability Obfuscation},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2014},
  year      = {2014},
  pages     = {176},
  ee        = {http://eprint.iacr.org/2014/176},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{GargGH014,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Mariana Raykova},
  title     = {Two-Round Secure MPC from Indistinguishability Obfuscation},
  booktitle = {TCC},
  year      = {2014},
  pages     = {74-94},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54242-8_4},
  crossref  = {DBLP:conf/tcc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{GrothOS12,
  author    = {Jens Groth and
               Rafail Ostrovsky and
               Amit Sahai},
  title     = {New Techniques for Noninteractive Zero-Knowledge},
  journal   = {J. ACM},
  volume    = {59},
  number    = {3},
  year      = {2012},
  pages     = {11},
  ee        = {http://doi.acm.org/10.1145/2220357.2220358},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{BlumFM88,
  author    = {Manuel Blum and
               Paul Feldman and
               Silvio Micali},
  title     = {Non-Interactive Zero-Knowledge and Its Applications (Extended
               Abstract)},
  booktitle = {STOC},
  year      = {1988},
  pages     = {103-112},
  ee        = {http://doi.acm.org/10.1145/62212.62222},
  crossref  = {DBLP:conf/stoc/STOC20},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{BarakP04,
  author    = {Boaz Barak and
               Rafael Pass},
  title     = {On the Possibility of One-Message Weak Zero-Knowledge},
  booktitle = {TCC},
  year      = {2004},
  pages     = {121-132},
  ee        = {http://dx.doi.org/10.1007/978-3-540-24638-1_7},
  crossref  = {DBLP:conf/tcc/2004},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Pass03,
  author    = {Rafael Pass},
  title     = {Simulation in Quasi-Polynomial Time, and Its Application
               to Protocol Composition},
  booktitle = {EUROCRYPT},
  year      = {2003},
  pages     = {160-176},
  ee        = {http://dx.doi.org/10.1007/3-540-39200-9_10},
  crossref  = {DBLP:conf/eurocrypt/2003},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BitanskyCPR14,
  author    = {Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen},
  title     = {On the Existence of Extractable One-Way Functions},
  booktitle = {STOC},
  year      = {2014}
}
%
@book{GOL1,
 author = {Goldreich, Oded},
 title = {Foundations of Cryptography: Basic Tools},
 year = {2000},
 isbn = {0521791723},
 publisher = {Cambridge University Press},
 address = {New York, NY, USA},
 }
%
@book{GOL2,
 author = {Goldreich, Oded},
 title = {Foundations of Cryptography: Volume 2, Basic Applications},
 year = {2004},
 isbn = {0521830842},
 publisher = {Cambridge University Press},
 address = {New York, NY, USA},
 }
%
@inproceedings{ChoOSV12,
  author    = {Chongwon Cho and
               Rafail Ostrovsky and
               Alessandra Scafuro and
               Ivan Visconti},
  title     = {Simultaneously Resettable Arguments of Knowledge},
  booktitle = {TCC},
  year      = {2012},
  pages     = {530-547},
  ee        = {http://dx.doi.org/10.1007/978-3-642-28914-9_30},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{BP12,
  author    = {Nir Bitansky and Omer Paneth},
  title     = {From the Impossibility of Obfuscation to a New Non-Black-Box Simulation Technique},
  booktitle = {FOCS},
  year      = {2012},
}
%
@inproceedings{Barak01,
  author    = {Boaz Barak},
  title     = {How to Go Beyond the Black-Box Simulation Barrier},
  booktitle = {FOCS},
  year      = {2001},
  pages     = {106-115},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2001.959885},
  crossref  = {DBLP:conf/focs/2001},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{LindellP09,
  author    = {Yehuda Lindell and
               Benny Pinkas},
  title     = {A Proof of Security of Yao's Protocol for Two-Party Computation},
  journal   = {J. Cryptology},
  volume    = {22},
  number    = {2},
  year      = {2009},
  pages     = {161-188},
  ee        = {http://dx.doi.org/10.1007/s00145-008-9036-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{Ben-OrGGHKMR88,
  author    = {Michael Ben-Or and
               Oded Goldreich and
               Shafi Goldwasser and
               Johan H{\aa}stad and
               Joe Kilian and
               Silvio Micali and
               Phillip Rogaway},
  title     = {Everything Provable is Provable in Zero-Knowledge},
  booktitle = {CRYPTO},
  year      = {1988},
  pages     = {37-56},
  ee        = {http://dx.doi.org/10.1007/0-387-34799-2_4},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{BarakGGL01,
  author    = {Boaz Barak and
               Oded Goldreich and
               Shafi Goldwasser and
               Yehuda Lindell},
  title     = {Resettably-Sound Zero-Knowledge and its Applications},
  booktitle = {FOCS},
  year      = {2001},
  pages     = {116-125},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2001.959886},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Micali00,
  author    = {Micali, Silvio},
  title     = {Computationally Sound Proofs},
  journal   = {SIAM Journal on Computing},
  volume    = {30},
  number    = {4},
  year      = {2000},
  pages     = {1253--1298},
  note      = {Preliminary version appeared in FOCS~'94.}
}
%
@inproceedings{GMW87,
 author = {Oded Goldreich and Silvio Micali and Avi Wigderson},
 title = {How to play ANY mental game},
 booktitle = {STOC '87: Proceedings of the nineteenth annual ACM symposium on Theory of computing},
 year = {1987},
 isbn = {0-89791-221-7},
 pages = {218--229},
 }
@article{Can00,
  author =	 {Ran Canetti},
  title =	 {Security and Composition of Multiparty Cryptographic
                  Protocols.},
  journal =	 {Journal of Cryptology},
  year =	 {2000},
  pages =	 {143--202},
}

@inproceedings{KRR13,
  author    = {Yael Tauman Kalai and
               Ran Raz and
               Ron D. Rothblum},
  title     = {Delegation for bounded space},
  booktitle = {STOC},
  year      = {2013},
  pages     = {565-574},
}
%
@inproceedings{Can01,
  author    = {Ran Canetti},
  title     = {Universally Composable Security: A New Paradigm for Cryptographic Protocols},
  booktitle = {Proceedings of the 42nd Annual IEEE Symposium on Foundations of Computer Science},
  year      = {2001},
  pages     = {136--145}
}
%
@inproceedings{KRR13a,
  author    = {Yael Tauman Kalai and
               Ran Raz and
               Ron D. Rothblum},
  title     = {Delegation for P},
  booktitle = {Announcement at STOC’13}.
}
%
@inproceedings{BarakGI01,
  author    = {Boaz Barak and
               Oded Goldreich and
               Russell Impagliazzo and
               Steven Rudich and
               Amit Sahai and
               Salil P. Vadhan and
               Ke Yang},
  title     = {On the (Im)possibility of Obfuscating Programs},
  booktitle = {CRYPTO},
  year      = {2001},
  pages     = {1-18},
  ee        = {http://dx.doi.org/10.1007/3-540-44647-8_1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{BitanskyCCGKPR14,
  author    = {Nir Bitansky and Ran Canetti and Henry Cohn and
               Shafi Goldwasser and
               Yael Tauman Kalai and Omer Paneth and Alon Rosen},
  title     = {The impossibility of obfuscation with auxiliary input or a universal simulator},
  journal   = {CoRR},
  volume    = {abs/1401.0348},
  year      = {2014},
  ee        = {http://arxiv.org/abs/1401.0348},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{CanettiGGM00,
  author    = {Ran Canetti and
               Oded Goldreich and
               Shafi Goldwasser and
               Silvio Micali},
  title     = {Resettable zero-knowledge (extended abstract)},
  booktitle = {STOC},
  year      = {2000},
  pages     = {235-244},
  ee        = {http://doi.acm.org/10.1145/335305.335334},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{GoldreichMW,
  author    = {Oded Goldreich and
               Silvio Micali and
               Avi Wigderson},
  title     = {Proofs that Yield Nothing But Their Validity for All Languages
               in NP Have Zero-Knowledge Proof Systems},
  journal   = {J. ACM},
  volume    = {38},
  number    = {3},
  year      = {1991},
  pages     = {691-729},
  ee        = {http://doi.acm.org/10.1145/116825.116852},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{BarakG08,
  author    = {Boaz Barak and
               Oded Goldreich},
  title     = {Universal Arguments and their Applications},
  journal   = {SIAM J. Comput.},
  volume    = {38},
  number    = {5},
  year      = {2008},
  pages     = {1661-1694},
  ee        = {http://dx.doi.org/10.1137/070709244},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{DengFGLSY11,
  author    = {Yi Deng and
               Dengguo Feng and
               Vipul Goyal and
               Dongdai Lin and
               Amit Sahai and
               Moti Yung},
  title     = {Resettable Cryptography in Constant Rounds - The Case of
               Zero Knowledge},
  booktitle = {ASIACRYPT},
  year      = {2011},
  pages     = {390-406},
  ee        = {http://dx.doi.org/10.1007/978-3-642-25385-0_21},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{GoyalS09,
  author    = {Vipul Goyal and
               Amit Sahai},
  title     = {Resettably Secure Computation},
  booktitle = {EUROCRYPT},
  year      = {2009},
  pages     = {54-71},
  ee        = {http://dx.doi.org/10.1007/978-3-642-01001-9_3},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{Groth10,
  author    = {Jens Groth},
  title     = {Short Pairing-Based Non-interactive Zero-Knowledge Arguments},
  booktitle = {ASIACRYPT},
  year      = {2010},
  pages     = {321-340},
  ee        = {http://dx.doi.org/10.1007/978-3-642-17373-8_19},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{GoyalM11,
  author    = {Vipul Goyal and
               Hemanta K. Maji},
  title     = {Stateless Cryptographic Protocols},
  booktitle = {FOCS},
  year      = {2011},
  pages     = {678-687},
  ee        = {http://dx.doi.org/10.1109/FOCS.2011.74},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{DengGS09,
  author    = {Yi Deng and
               Vipul Goyal and
               Amit Sahai},
  title     = {Resolving the Simultaneous Resettability Conjecture and
               a New Non-Black-Box Simulation Strategy},
  booktitle = {FOCS},
  year      = {2009},
  pages     = {251-260},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/FOCS.2009.59},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{GargOVW11,
  author    = {Sanjam Garg and
               Rafail Ostrovsky and
               Ivan Visconti and
               Akshay Wadia},
  title     = {Resettable Statistical Zero Knowledge},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2011},
  year      = {2011},
  pages     = {457},
  ee        = {http://eprint.iacr.org/2011/457},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@inproceedings{MicaliR01,
  author    = {Silvio Micali and
               Leonid Reyzin},
  title     = {Min-round Resettable Zero-Knowledge in the Public-Key Model},
  booktitle = {EUROCRYPT},
  year      = {2001},
  pages     = {373-393},
  ee        = {http://dx.doi.org/10.1007/3-540-44987-6_23},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{CanettiKPR02,
  author    = {Ran Canetti and
               Joe Kilian and
               Erez Petrank and
               Alon Rosen},
  title     = {Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically
               Many Rounds},
  journal   = {SIAM J. Comput.},
  volume    = {32},
  number    = {1},
  year      = {2002},
  pages     = {1-47},
}

@inproceedings{HaitnerRS09,
  author    = {Iftach Haitner and
               Alon Rosen and
               Ronen Shaltiel},
  title     = {On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols},
  booktitle = {TCC},
  year      = {2009},
  pages     = {220-237},
}
@inproceedings{BellareFGM01,
  author    = {Mihir Bellare and
               Marc Fischlin and
               Shafi Goldwasser and
               Silvio Micali},
  title     = {Identification Protocols Secure against Reset Attacks},
  booktitle = {EUROCRYPT},
  year      = {2001},
  pages     = {495-511},
  ee        = {http://dx.doi.org/10.1007/3-540-44987-6_30},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{GoldreichKraw96,
  author    = {Oded Goldreich and
               Hugo Krawczyk},
  title     = {On the Composition of Zero-Knowledge Proof Systems},
  journal   = {SIAM J. Comput.},
  volume    = {25},
  number    = {1},
  year      = {1996},
  pages     = {169-192},
  ee        = {http://dx.doi.org/10.1137/S0097539791220688},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{GoldreichKah96,
  author    = {Oded Goldreich and
               Ariel Kahan},
  title     = {How to Construct Constant-Round Zero-Knowledge Proof Systems
               for NP},
  journal   = {J. Cryptology},
  volume    = {9},
  number    = {3},
  year      = {1996},
  pages     = {167-190},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
%
@article{GoldwasserMR89,
  author    = {Shafi Goldwasser and
               Silvio Micali and
               Charles Rackoff},
  title     = {The Knowledge Complexity of Interactive Proof Systems},
  journal   = {SIAM J. Comput.},
  volume    = {18},
  number    = {1},
  year      = {1989},
  pages     = {186-208},
  ee        = {http://dx.doi.org/10.1137/0218012},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{BarakLV06,
  author    = {Boaz Barak and
               Yehuda Lindell and
               Salil P. Vadhan},
  title     = {Lower bounds for non-black-box zero knowledge},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {72},
  number    = {2},
  year      = {2006},
  pages     = {321-391},
  ee        = {http://dx.doi.org/10.1016/j.jcss.2005.06.010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Damgard91,
  author    = {Damg{\aa}rd, Ivan},
  title     = {Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks},
  booktitle = {Proceedings of CRYPTO’91},
  year      = {1992},
  pages     = {445--456},
}
%
%
@inproceedings{HadaT98,
  author    = {Hada, Satoshi and Tanaka, Toshiaki},
  title     = {On the Existence of 3-Round Zero-Knowledge Protocols},
  booktitle = {Proceedings of the 18th Annual International Cryptology Conference},
  year      = {1998},
  pages     = {408--423},
}
%
@article{GuptaS12,
  author    = {Divya Gupta and
               Amit Sahai},
  title     = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge
               Assumption},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2012},
  year      = {2012},
  pages     = {572},
}

@inproceedings{BellareP04,
  author    = {Bellare, Mihir and Palacio, Adriana},
  title     = {The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols},
  booktitle = {Proceedings of the 24th Annual International Cryptology Conference},
  year      = {2004},
  pages     = {273--289},
}
@inproceedings{LapidotS,
  author    = {Dror Lapidot and
               Adi Shamir},
  title     = {Publicly Verifiable Non-Interactive Zero-Knowledge Proofs},
  booktitle = {CRYPTO},
  year      = {1990},
  pages     = {353-365},
  ee        = {http://dx.doi.org/10.1007/3-540-38424-3_26},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{ChungPS13,
  author    = {Kai-Min Chung and
               Rafael Pass and
               Karn Seth},
  title     = {Non-black-box simulation from one-way functions and applications
               to resettable security},
  booktitle = {STOC},
  year      = {2013},
  pages     = {231-240},
}

@inproceedings{BitanskyP13,
  author    = {Nir Bitansky and
               Omer Paneth},
  title     = {On the impossibility of approximate obfuscation and applications
               to resettable cryptography},
  booktitle = {STOC},
  year      = {2013},
  pages     = {241-250},
  ee        = {http://doi.acm.org/10.1145/2488608.2488639},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{PassW09,
  author    = {Rafael Pass and
               Hoeteck Wee},
  title     = {Black-Box Constructions of Two-Party Protocols from One-Way
               Functions},
  booktitle = {TCC},
  year      = {2009},
  pages     = {403-418},
  ee        = {http://dx.doi.org/10.1007/978-3-642-00457-5_24},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{PrabhakaranRS02,
  author    = {Manoj Prabhakaran and
               Alon Rosen and
               Amit Sahai},
  title     = {Concurrent Zero Knowledge with Logarithmic Round-Complexity},
  booktitle = {FOCS},
  year      = {2002},
  pages     = {366-375},
}
@inproceedings{GentryW11,
  author    = {Gentry, Craig and Wichs, Daniel},
  title     = {Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions},
  booktitle = {Proceedings of the 43rd Annual ACM Symposium on Theory of Computing},
  year      = {2011},
  pages     = {99--108},
}
%
@article{FeigeLS99,
  author    = {Uriel Feige and
               Dror Lapidot and
               Adi Shamir},
  title     = {Multiple NonInteractive Zero Knowledge Proofs Under General
               Assumptions},
  journal   = {SIAM J. Comput.},
  volume    = {29},
  number    = {1},
  year      = {1999},
  pages     = {1-28},
  ee        = {http://dx.doi.org/10.1137/S0097539792230010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{GentryHV10,
  author    = {Craig Gentry and
               Shai Halevi and
               Vinod Vaikuntanathan},
  title     = {{\it i}-Hop Homomorphic Encryption and Rerandomizable Yao
               Circuits},
  booktitle = {CRYPTO},
  year      = {2010},
  pages     = {155-172},
  ee        = {http://dx.doi.org/10.1007/978-3-642-14623-7_9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{PrabhakaranRS02,
  author    = {Manoj Prabhakaran and
               Alon Rosen and
               Amit Sahai},
  title     = {Concurrent Zero Knowledge with Logarithmic Round-Complexity},
  booktitle = {FOCS},
  year      = {2002},
  pages     = {366-375},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2002.1181961},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{FeigeS89,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {Zero Knowledge Proofs of Knowledge in Two Rounds},
  booktitle = {CRYPTO},
  year      = {1989},
  pages     = {526-544},
  ee        = {http://dx.doi.org/10.1007/0-387-34805-0_46},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{OstrovskyV12,
  author    = {Rafail Ostrovsky and
               Ivan Visconti},
  title     = {Simultaneous Resettability from Collision Resistance},
  journal   = {Electronic Colloquium on Computational Complexity (ECCC)},
  year      = {2012},
  ee        = {http://eccc.hpi-web.de/report/2012/164}
}

@inproceedings{Damgard89,
  author    = {Ivan Damg{\aa}rd},
  title     = {On the Existence of Bit Commitment Schemes and Zero-Knowledge
               Proofs},
  booktitle = {CRYPTO},
  year      = {1989},
  pages     = {17-27},
  ee        = {http://dx.doi.org/10.1007/0-387-34805-0_3},
  crossref  = {DBLP:conf/crypto/1989},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{Blum86,
  author    = {Manuel Blum},
  title     = {How to Prove a Theorem So No One Else Can Claim It},
  booktitle = {Proceedings of the International Congress of Mathematicians},
  year      = {1986},
  pages     = {1444-1451},
}

@inproceedings{BarakL02,
  author    = {Boaz Barak and
               Yehuda Lindell},
  title     = {Strict polynomial-time in simulation and extraction},
  booktitle = {STOC},
  year      = {2002},
  pages     = {484-493},
  ee        = {http://doi.acm.org/10.1145/509907.509979},
  crossref  = {DBLP:conf/stoc/2002},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{Barak02,
  author    = {Boaz Barak},
  title     = {Constant-Round Coin-Tossing with a Man in the Middle or
               Realizing the Shared Random String Model},
  booktitle = {FOCS},
  year      = {2002},
  pages     = {345-355},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2002.1181957},
  crossref  = {DBLP:conf/focs/2002},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{PRW11,
  author    = {Rafael Pass and Alon Rosen and Wei-Lung Dustin Tseng},
  title     = {Public-coin Parallal Zero-knowledge for NP},
  journal   = {J. Cryptology},
  year      = {2011},
  ee        = {http://www.cs.cornell.edu/~rafael/papers/nonBBZK.pdf},
}

@inproceedings{PassR03,
  author    = {Rafael Pass and
               Alon Rosen},
  title     = {Bounded-Concurrent Secure Two-Party Computation in a Constant
               Number of Rounds},
  booktitle = {FOCS},
  year      = {2003},
  pages     = {404-413},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2003.1238214},
  crossref  = {DBLP:conf/focs/2003},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{PassR08,
  author    = {Rafael Pass and
               Alon Rosen},
  title     = {Concurrent Nonmalleable Commitments},
  journal   = {SIAM J. Comput.},
  volume    = {37},
  number    = {6},
  year      = {2008},
  pages     = {1891-1925},
  ee        = {http://dx.doi.org/10.1137/060661880},
  bibsource = {DBLP, http://dblp.uni-trier.de}

@article{PassR08a,
  author    = {Rafael Pass and
               Alon Rosen},
  title     = {New and Improved Constructions of Nonmalleable Cryptographic
               Protocols},
  journal   = {SIAM J. Comput.},
  volume    = {38},
  number    = {2},
  year      = {2008},
  pages     = {702-752},
  ee        = {http://dx.doi.org/10.1137/060671553},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

%@PHDTHESIS{Barak04thesis,
%  AUTHOR = {Boaz Barak},
%  TITLE = {Non-Black-Box Techniques in Cryptography},
%  SCHOOL = {Department of Computer Science and Applied Mathematics, Weizmann
%    Institute of Science, Rehovot, Israel},
%  YEAR = {2004}
%}

@article{BS05,
  author    = {Boaz Barak and
               Amit Sahai},
  title     = {How To Play Almost Any Mental Game Over The Net - Concurrent
               Composition via Super-Polynomial Simulation},
  journal   = {Electronic Colloquium on Computational Complexity (ECCC)},
  number    = {096},
  year      = {2005},
  ee        = {http://eccc.hpi-web.de/eccc-reports/2005/TR05-096/index.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{Pass03,
  author    = {Rafael Pass},
  title     = {Simulation in Quasi-Polynomial Time, and Its Application
               to Protocol Composition},
  booktitle = {EUROCRYPT},
  year      = {2003},
  pages     = {160-176},
  ee        = {http://dx.doi.org/10.1007/3-540-39200-9_10},
  crossref  = {DBLP:conf/eurocrypt/2003},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{GoyalS09,
  author    = {Vipul Goyal and
               Amit Sahai},
  title     = {Resettably Secure Computation},
  booktitle = {EUROCRYPT},
  year      = {2009},
  pages     = {54-71},
  ee        = {http://dx.doi.org/10.1007/978-3-642-01001-9_3},
  crossref  = {DBLP:conf/eurocrypt/2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{GoldreichO94,
  author    = {Goldreich, Oded and Oren, Yair},
  title     = {Definitions and properties of zero-knowledge proof systems},
  journal   = {Journal of Cryptology},
  volume    = {7},
  number    = {1},
  year      = {1994},
  month     = {December},
  pages     = {1--32},
}
%

@inproceedings{NaorP01,
  author    = {Moni Naor and
               Benny Pinkas},
  title     = {Efficient oblivious transfer protocols},
  booktitle = {SODA},
  year      = {2001},
  pages     = {448-457},
  ee        = {http://doi.acm.org/10.1145/365411.365502},
  crossref  = {DBLP:conf/soda/2001},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{DworkN07,
  author    = {Cynthia Dwork and
               Moni Naor},
  title     = {Zaps and Their Applications},
  journal   = {SIAM J. Comput.},
  volume    = {36},
  number    = {6},
  year      = {2007},
  pages     = {1513-1543},
  ee        = {http://dx.doi.org/10.1137/S0097539703426817},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{CanettiLP10,
  author    = {Ran Canetti and
               Huijia Lin and
               Rafael Pass},
  title     = {Adaptive Hardness and Composable Security in the Plain Model
               from Standard Assumptions},
  booktitle = {FOCS},
  year      = {2010},
  pages     = {541-550},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/FOCS.2010.86},
  crossref  = {DBLP:conf/focs/2010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{Yao86,
  author    = {Andrew Chi-Chih Yao},
  title     = {How to Generate and Exchange Secrets (Extended Abstract)},
  booktitle = {FOCS},
  year      = {1986},
  pages     = {162-167},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.1986.25},
  crossref  = {DBLP:conf/focs/FOCS27},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{AielloIR01,
  author    = {William Aiello and
               Yuval Ishai and
               Omer Reingold},
  title     = {Priced Oblivious Transfer: How to Sell Digital Goods},
  booktitle = {EUROCRYPT},
  year      = {2001},
  pages     = {119-135},
  ee        = {http://dx.doi.org/10.1007/3-540-44987-6_8},
  crossref  = {DBLP:conf/eurocrypt/2001},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{HaleviK12,
  author    = {Shai Halevi and
               Yael Tauman Kalai},
  title     = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
  journal   = {J. Cryptology},
  volume    = {25},
  number    = {1},
  year      = {2012},
  pages     = {158-193},
  ee        = {http://dx.doi.org/10.1007/s00145-010-9092-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{BitanskyC12,
  author    = {Nir Bitansky and
               Alessandro Chiesa},
  title     = {Succinct Arguments from Multi-prover Interactive Proofs
               and Their Efficiency Benefits},
  booktitle = {CRYPTO},
  year      = {2012},
  pages     = {255-272},
  ee        = {http://dx.doi.org/10.1007/978-3-642-32009-5_16},
  crossref  = {DBLP:conf/crypto/2012},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ChungLP13,
  author    = {Kai-Min Chung and
                Huijia Lin	and	
                Rafael  Pass},
  title     = {Constant-Round Concurrent Zero Knowledge From P-Certificates},
  booktitle = {FOCS},
  year      = {2013},
}

@inproceedings{BitanskyCCT13,
  author    = {Nir Bitansky and
               Ran Canetti and
               Alessandro Chiesa and
               Eran Tromer},
  title     = {Recursive composition and bootstrapping for SNARKS and proof-carrying
               data},
  booktitle = {STOC},
  year      = {2013},
  pages     = {111-120},
  ee        = {http://doi.acm.org/10.1145/2488608.2488623},
  crossref  = {DBLP:conf/stoc/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{Canetti97,
  author    = {Ran Canetti},
  title     = {Towards Realizing Random Oracles: Hash Functions That Hide
               All Partial Information},
  booktitle = {CRYPTO},
  year      = {1997},
  pages     = {455-469},
  ee        = {http://dx.doi.org/10.1007/BFb0052255},
  crossref  = {DBLP:conf/crypto/1997},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{BitanskyCIPO13,
  author    = {Nir Bitansky and
               Alessandro Chiesa and
               Yuval Ishai and
               Rafail Ostrovsky and
               Omer Paneth},
  title     = {Succinct Non-interactive Arguments via Linear Interactive
               Proofs},
  booktitle = {TCC},
  year      = {2013},
  pages     = {315-333},
  ee        = {http://dx.doi.org/10.1007/978-3-642-36594-2_18},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{Wee05,
  author    = {Hoeteck Wee},
  title     = {On Obfuscating Point Functions},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2005},
  year      = {2005},
  pages     = {1},
  ee        = {http://eprint.iacr.org/2005/001},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{CanettiGH04,
  author    = {Ran Canetti and
               Oded Goldreich and
               Shai Halevi},
  title     = {The random oracle methodology, revisited},
  journal   = {J. ACM},
  volume    = {51},
  number    = {4},
  year      = {2004},
  pages     = {557-594},
  ee        = {http://doi.acm.org/10.1145/1008731.1008734},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{CanettiRV10,
  author    = {Ran Canetti and
               Guy N. Rothblum and
               Mayank Varia},
  title     = {Obfuscation of Hyperplane Membership},
  booktitle = {TCC},
  year      = {2010},
  pages     = {72-89},
  ee        = {http://dx.doi.org/10.1007/978-3-642-11799-2_5},
  crossref  = {DBLP:conf/tcc/2010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{GoldwasserK05,
  author    = {Shafi Goldwasser and
               Yael Tauman Kalai},
  title     = {On the Impossibility of Obfuscation with Auxiliary Input},
  booktitle = {FOCS},
  year      = {2005},
  pages     = {553-562},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2005.60},
  crossref  = {DBLP:conf/focs/2005},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{DziembowskiF11,
  author    = {Stefan Dziembowski and
               Sebastian Faust},
  title     = {Leakage-Resilient Cryptography from the Inner-Product Extractor},
  booktitle = {ASIACRYPT},
  year      = {2011},
  pages     = {702-721},
  ee        = {http://dx.doi.org/10.1007/978-3-642-25385-0_38},
  crossref  = {DBLP:conf/asiacrypt/2011},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{GoldwasserR12,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {How to Compute in the Presence of Leakage},
  booktitle = {FOCS},
  year      = {2012},
  pages     = {31-40},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/FOCS.2012.34},
  crossref  = {DBLP:conf/focs/2012},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{GargGH13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi},
  title     = {Candidate Multilinear Maps from Ideal Lattices},
  booktitle = {EUROCRYPT},
  year      = {2013},
  pages     = {1-17},
  ee        = {http://dx.doi.org/10.1007/978-3-642-38348-9_1},
  crossref  = {DBLP:conf/eurocrypt/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{ValiantSBR83,
  author    = {Leslie G. Valiant and
               Sven Skyum and
               S. Berkowitz and
               Charles Rackoff},
  title     = {Fast Parallel Computation of Polynomials Using Few Processors},
  journal   = {SIAM J. Comput.},
  volume    = {12},
  number    = {4},
  year      = {1983},
  pages     = {641-644},
  ee        = {http://dx.doi.org/10.1137/0212043},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{CoronLT13,
  author    = {Jean-S{\'e}bastien Coron and
               Tancr{\`e}de Lepoint and
               Mehdi Tibouchi},
  title     = {Practical Multilinear Maps over the Integers},
  booktitle = {CRYPTO (1)},
  year      = {2013},
  pages     = {476-493},
  ee        = {http://dx.doi.org/10.1007/978-3-642-40041-4_26},
  crossref  = {DBLP:conf/crypto/2013-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@misc{BrakerskiR13,
    author = {Zvika Brakerski and Guy N. Rothblum},
    title = {Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding},
    howpublished = {Cryptology ePrint Archive, Report 2013/563},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}

@misc{BarakGKPS13,
    author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai},
    title = {Protecting Obfuscation Against Algebraic Attacks},
    howpublished = {Cryptology ePrint Archive, Report 2013/631},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}

@inproceedings{GargGSW13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Amit Sahai and
               Brent Waters},
  title     = {Witness encryption and its applications},
  booktitle = {STOC},
  year      = {2013},
  pages     = {467-476},
  ee        = {http://doi.acm.org/10.1145/2488608.2488667},
  crossref  = {DBLP:conf/stoc/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{BoyleCP14,
  author    = {Elette Boyle and
               Kai-Min Chung and
               Rafael Pass},
  title     = {On Extractability Obfuscation},
  booktitle = {TCC},
  year      = {2014},
  pages     = {52-73},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54242-8_3},
  crossref  = {DBLP:conf/tcc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{BarakOV07,
  author    = {Boaz Barak and
               Shien Jin Ong and
               Salil P. Vadhan},
  title     = {Derandomization in Cryptography},
  journal   = {SIAM J. Comput.},
  volume    = {37},
  number    = {2},
  year      = {2007},
  pages     = {380-400},
  ee        = {http://dx.doi.org/10.1137/050641958},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{BarakBCKPS13,
  author    = {Boaz Barak and
               Nir Bitansky and
               Ran Canetti and
               Yael Tauman Kalai and
               Omer Paneth and
               Amit Sahai},
  title     = {Obfuscation for Evasive Functions},
  booktitle = {TCC},
  year      = {2014},
  pages     = {26-51},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54242-8_2},
  crossref  = {DBLP:conf/tcc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@misc{PassTS13,
    author = {Rafael Pass and Sidharth Telang and Karn Seth},
    title = {Obfuscation from Semantically-Secure Multi-linear Encodings},
    howpublished = {Cryptology ePrint Archive, Report 2013/781},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}

@misc{GargGHW13,
    author = {Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs},
    title = {On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input},
    howpublished = {Cryptology ePrint Archive, Report 2013/860},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}

@misc{AnanthBGSZ13,
    author = {Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry},
    title = {Differing-Inputs Obfuscation and Applications},
    howpublished = {Cryptology ePrint Archive, Report 2013/689},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}

@inproceedings{GargGH0SW13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Mariana Raykova and
               Amit Sahai and
               Brent Waters},
  title     = {Candidate Indistinguishability Obfuscation and Functional
               Encryption for all Circuits},
  booktitle = {FOCS},
  year      = {2013},
  pages     = {40-49},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/FOCS.2013.13},
  crossref  = {DBLP:conf/focs/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{GoldwasserO92,
  author    = {Shafi Goldwasser and
               Rafail Ostrovsky},
  title     = {Invariant Signatures and Non-Interactive Zero-Knowledge
               Proofs are Equivalent (Extended Abstract)},
  booktitle = {CRYPTO},
  year      = {1992},
  pages     = {228-245},
  ee        = {http://dx.doi.org/10.1007/3-540-48071-4_16},
  crossref  = {DBLP:conf/crypto/1992},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BoyleGI14,
  author    = {Elette Boyle and
               Shafi Goldwasser and
               Ioana Ivan},
  title     = {Functional Signatures and Pseudorandom Functions},
  booktitle = {Public Key Cryptography},
  year      = {2014},
  pages     = {501-519},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54631-0_29},
  crossref  = {DBLP:conf/pkc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BonehW13,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {Constrained Pseudorandom Functions and Their Applications},
  booktitle = {ASIACRYPT (2)},
  year      = {2013},
  pages     = {280-300},
  ee        = {http://dx.doi.org/10.1007/978-3-642-42045-0_15},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{KiayiasPTZ13,
  author    = {Aggelos Kiayias and
               Stavros Papadopoulos and
               Nikos Triandopoulos and
               Thomas Zacharias},
  title     = {Delegatable pseudorandom functions and applications},
  booktitle = {ACM Conference on Computer and Communications Security},
  year      = {2013},
  pages     = {669-684},
  ee        = {http://doi.acm.org/10.1145/2508859.2516668},
  crossref  = {DBLP:conf/ccs/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{GoldreichGM86,
  author    = {Oded Goldreich and
               Shafi Goldwasser and
               Silvio Micali},
  title     = {How to construct random functions},
  journal   = {J. ACM},
  volume    = {33},
  number    = {4},
  year      = {1986},
  pages     = {792-807},
  ee        = {http://doi.acm.org/10.1145/6490.6503},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{BrakerskiGRV09,
  author    = {Zvika Brakerski and
               Shafi Goldwasser and
               Guy N. Rothblum and
               Vinod Vaikuntanathan},
  title     = {Weak Verifiable Random Functions},
  booktitle = {TCC},
  year      = {2009},
  pages     = {558-576},
  ee        = {http://dx.doi.org/10.1007/978-3-642-00457-5_33},
  crossref  = {DBLP:conf/tcc/2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{BellareY96,
  author    = {Mihir Bellare and
               Moti Yung},
  title     = {Certifying Permutations: Noninteractive Zero-Knowledge Based
               on Any Trapdoor Permutation},
  journal   = {J. Cryptology},
  volume    = {9},
  number    = {3},
  year      = {1996},
  pages     = {149-166},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
