On the statistical leak of the GGH13 multilinear map and some variants
From MaRDI portal
Publication:1633467
DOI10.1007/978-3-030-03326-2_16zbMATH Open1446.94129OpenAlexW2896924988MaRDI QIDQ1633467FDOQ1633467
Authors: Léo Ducas, Alice Pellet-Mary
Publication date: 20 December 2018
Full work available at URL: https://ir.cwi.nl/pub/28260
Recommendations
- Cryptanalysis of GGH15 multilinear maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Leaky roots and stable Gauss-Lucas theorems
- Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map
- Some properties of Mittag-Leffler functions and matrix-variate analogues: a statistical perspective
- GGHLite: more efficient multilinear maps from ideal lattices
- Shrinking generators and statistical leakage
- A method of constructing linear mapping families to achieve the asymptotic GV bound
- Unifying leakage models on a Rényi day
- A multivariate extension of Hoeffding's lemma
Cites Work
- A fast Diffie-Hellman protocol in genus 2
- Sequences of numbers generated by addition in formal groups and new primality and factorization tests
- Arithmetic variety of moduli for genus two
- Arithmetic on abelian and Kummer varieties
- Fast cryptography in genus 2
- Kummer strikes back: new DH speed records
- Factorization with genus 2 curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Fast genus 2 arithmetic based on Theta functions
- Public Key Cryptography - PKC 2006
- Mathematics of public key cryptography.
- Leveled fully homomorphic signatures from standard lattices
- Title not available (Why is that?)
- Linearly Homomorphic Structure-Preserving Signatures and Their Applications
- Descent via \((3,3)\)-isogeny on Jacobians of genus 2 curves
- Title not available (Why is that?)
- Title not available (Why is that?)
- Automata, Languages and Programming
- Universal designated-verifier signatures
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Constructing elliptic curve isogenies in quantum subexponential time
- Subvarieties of moduli spaces
- Computationally Sound Proofs
- Legendre elliptic curves over finite fields
- Public-key cryptography -- PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26--March 1, 2013. Proceedings
- Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures
- Descent via \((5, 5)\)-isogeny on Jacobians of genus 2 curves
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Title not available (Why is that?)
- Hyper-and-elliptic-curve cryptography
- Advances in cryptology -- EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11--15, 2014. Proceedings
- Computing isogenies between Montgomery curves using the action of \((0,0)\)
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- Jacobian coordinates on genus 2 curves
- Public-key cryptography -- PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26--28, 2014. Proceedings
- Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes
- A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
- On the size of pairing-based non-interactive arguments
Cited In (3)
This page was built for publication: On the statistical leak of the GGH13 multilinear map and some variants
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1633467)