There are many different helpful applications that also can’t obfuscate, notably when you attempt to use them in real systems. These points had been quickly identified by Barak et al., and later in different practical settings by Goldwasser and Kalai, amo ...
