The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
From MaRDI portal
Publication:1631346
DOI10.1007/978-3-030-03810-6_19zbMath1430.94082OpenAlexW2900334118MaRDI QIDQ1631346
Publication date: 6 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-03810-6_19
Related Items (8)
One-Way Functions and (Im)perfect Obfuscation ⋮ Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration ⋮ The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks ⋮ Return of GGH15: provable security against zeroizing attacks ⋮ Adaptive multiparty NIKE ⋮ Lattice-based succinct arguments for NP with polylogarithmic-time verification ⋮ A survey on functional encryption ⋮ Obfustopia built on secret-key functional encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Quantum attacks against indistinguishablility obfuscators proved secure in the weak multilinear map model
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- Return of GGH15: provable security against zeroizing attacks
- On arithmetic branching programs
- Functional Encryption for Turing Machines
- Order-Revealing Encryption and the Hardness of Private Learning
- Multilinear Maps from Obfuscation
- Perfect Structure on the Edge of Chaos
- Functional Encryption Without Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of the New CLT Multilinear Map over the Integers
- Cryptanalysis of GGH Map
- Cryptanalysis of GGH15 Multilinear Maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- A Subfield Lattice Attack on Overstretched NTRU Assumptions
- Practical Multilinear Maps over the Integers
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Low Overhead Broadcast Encryption from Multilinear Maps
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Cryptanalysis of the Multilinear Map over the Integers
- How to Obfuscate Programs Directly
- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
- On the Communication Complexity of Secure Function Evaluation with Long Output
- Secure Obfuscation in a Weak Multilinear Map Model
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- New Multilinear Maps Over the Integers
- Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation
- Candidate Multilinear Maps from Ideal Lattices
- How to use indistinguishability obfuscation
- Graph-Induced Multilinear Maps from Lattices
- Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
- Cryptanalyses of Candidate Branching Program Obfuscators
- Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
- Protecting Obfuscation against Algebraic Attacks
- Witness encryption and its applications
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Recovering Short Generators of Principal Ideals in Cyclotomic Rings
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
This page was built for publication: The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks