Counterexamples to new circular security assumptions underlying iO (Q2128580): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-84245-1_23 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3173807823 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Agility and Its Relation to Circular Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Circular Security Counterexamples from Decision Linear and Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413854 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate iO from homomorphic encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Four round secure computation without setup / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778843 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Definitions and Separations for Circular Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Obfuscation in a Weak Multilinear Map Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from circular security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate One-Way Functions Based on Expander Graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leveled Fully Homomorphic Signatures from Standard Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Arithmetic Computation with No Honest Majority / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separations in Circular Security for Arbitrary Length Key Cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular Security Separations for Arbitrary Length Cycles from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst‐Case to Average‐Case Reductions Based on Gaussian Measures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Circular Security of Bit-Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate obfuscation via oblivious LWE sampling / rank
 
Normal rank

Latest revision as of 17:37, 28 July 2024

scientific article
Language Label Description Also known as
English
Counterexamples to new circular security assumptions underlying iO
scientific article

    Statements

    Counterexamples to new circular security assumptions underlying iO (English)
    0 references
    0 references
    0 references
    0 references
    22 April 2022
    0 references
    fully homomorphic encryption scheme
    0 references
    generic leakage-resilient circular security
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers