1

Universal Multi-party Poisoning Attacks
When does Functional Encryption Imply Obfuscation?
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation