New Multilinear Maps Over the Integers

From MaRDI portal
Revision as of 20:29, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3457114

DOI10.1007/978-3-662-47989-6_13zbMath1375.94116OpenAlexW1915197037MaRDI QIDQ3457114

Mehdi Tibouchi, Jean-Sébastien Coron, Tancrède Lepoint

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_13




Related Items (41)

One-Way Functions and (Im)perfect ObfuscationTowards faster polynomial-time lattice reductionCutting-edge cryptography through the lens of secret sharingThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksDelegating RAM Computations with Adaptive Soundness and PrivacySecure Obfuscation in a Weak Multilinear Map ModelCompactness vs Collusion Resistance in Functional EncryptionCryptanalysis of multilinear maps from ideal lattices: revisitedProofs of Work from worst-case assumptionsNew approaches to traitor tracing with embedded identitiesThe random oracle model: a twenty-year retrospectiveMultilinear maps from obfuscationOn virtual grey box obfuscation for general circuitsSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsCryptanalysis of the CLT13 multilinear mapWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Lattice-based succinct arguments for NP with polylogarithmic-time verificationSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingAn algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zeroPractical Order-Revealing Encryption with Limited LeakageObfuscating conjunctionsEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsConstraining Pseudorandom Functions PrivatelyShort Generators Without Quantum Computers: The Case of MultiquadraticsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsFunctional encryption for cascade automataIndistinguishability Obfuscation: From Approximate to ExactMultilinear Maps from ObfuscationPerfect Structure on the Edge of ChaosHow to build time-lock encryptionCutting-Edge Cryptography Through the Lens of Secret SharingFunctional Encryption Without ObfuscationConstrained pseudorandom functions from functional encryptionNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationShorter Circuit Obfuscation in Challenging Security ModelsCryptanalysis of GGH15 Multilinear MapsRevisiting orthogonal lattice attacks on approximate common divisor problems



Cites Work




This page was built for publication: New Multilinear Maps Over the Integers