Program Obfuscation: New Applications And Constructions From Standard Assumptions