Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_22 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4285228989 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Obfuscation against Algebraic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5875789 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New techniques for obfuscating conjunctions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate iO from homomorphic encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalyses of Candidate Branching Program Obfuscators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Watermarking cryptographic capabilities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct LWE sampling, random polynomials, and obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from circular security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counterexamples to new circular security assumptions underlying iO / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH Map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737161 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation for Turing Machines with Unbounded Memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate obfuscation via oblivious LWE sampling / rank
 
Normal rank

Latest revision as of 00:02, 30 July 2024

scientific article
Language Label Description Also known as
English
Cryptanalysis of candidate obfuscators for affine determinant programs
scientific article

    Statements

    Cryptanalysis of candidate obfuscators for affine determinant programs (English)
    0 references
    0 references
    0 references
    0 references
    30 August 2022
    0 references
    \textit{J. Bartusek} et al. [``Affine determinant programs: a framework for obfuscation and witness encryption'', Preprint, \url{https://eprint.iacr.org/2020/889.pdf}] proposed a candidate indistinguishability obfuscator for affine determinant programs (ADPs). The candidate is special since it directly applies specific randomization techniques to the underlying ADP, without relying on the hardness of traditional cryptographic assumptions like discrete-log or learning with errors. It is relatively efficient compared to the rest of the indistinguishability obfuscator candidates. However, the obfuscation scheme requires further cryptanalysis since it was not known to be based on any well-formed mathematical assumptions. In this paper, the authors show cryptanalytic attacks on the indistinguishability obfuscator candidate provided by Bartusek et al. [loc. cit.]. Their attack exploits the weakness of one of the randomization steps in the candidate. The attack applies to a fairly general class of programs. At the end of the paper, they discuss plausible countermeasures to defend against attacks. For the entire collection see [Zbl 1493.94001].
    0 references
    indistinguishability obfuscation
    0 references
    cryptanalysis
    0 references
    affine determinant program
    0 references
    0 references
    0 references
    0 references

    Identifiers