Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs

From MaRDI portal
Publication:1675746

DOI10.1007/978-3-319-63688-7_20zbMath1407.94138OpenAlexW2752847244MaRDI QIDQ1675746

Huijia Lin

Publication date: 3 November 2017

Full work available at URL: https://doi.org/10.1007/978-3-319-63688-7_20




Related Items (49)

One-Way Functions and (Im)perfect ObfuscationAdaptive Simulation Security for Inner Product Functional EncryptionA New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsFE and iO for Turing machines from minimal assumptionsAn efficient structural attack on NIST submission DAGSBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinMulti-input quadratic functional encryption from pairingsAnonymous IBE, leakage resilience and circular security from new assumptionsTowards breaking the exponential barrier for general secret sharingCryptanalysis of candidate obfuscators for affine determinant programsIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)From cryptomania to obfustopia through secret-key functional encryptionProofs of Work from worst-case assumptionsFrom FE combiners to secure MPC and backMultilinear maps from obfuscationUnbounded quadratic functional encryption and more from pairingsMulti-client inner product encryption: function-hiding instantiations without random oracles(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linUnbounded predicate inner product functional encryption from pairingsMulti-client functional encryption with fine-grained access controlPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Candidate witness encryption from lattice techniquesMulti-input attribute based encryption and predicate encryptionA survey on functional encryptionNon-interactive zero-knowledge from non-interactive batch argumentsStreaming functional encryptionIndistinguishability obfuscationInner-product functional encryption with fine-grained access controlTightly secure inner product functional encryption: multi-input and function-hiding constructionsOn the complexity of compressing obfuscationCandidate iO from homomorphic encryption schemesUnbounded inner product functional encryption from bilinear mapsUnbounded inner product functional encryption from bilinear mapsObfustopia built on secret-key functional encryptionSimple and efficient FE for quadratic functionsNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesCandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECombiners for functional encryption, unconditionallyImpossibility results for lattice-based functional encryption schemesCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Tightly CCA-secure inner product functional encryption schemeIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingNon-interactive anonymous routerFunctional encryption for attribute-weighted sums from \(k\)-LinAmplifying the security of functional encryption, unconditionally




This page was built for publication: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs