How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)

From MaRDI portal
Publication:2292646

DOI10.1007/978-3-030-17653-2_9zbMath1470.94090OpenAlexW2945147690MaRDI QIDQ2292646

Amit Sahai, Christian Matt, Aayush Jain, Huijia Lin

Publication date: 4 February 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-17653-2_9




Related Items (34)

Counterexamples to new circular security assumptions underlying iOFunctional encryption for Turing machines with dynamic bounded collusion from LWEAttribute-based access control for inner product functional encryption from LWESimpler constructions of asymmetric primitives from obfuscationCryptanalysis of candidate obfuscators for affine determinant programsIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)On the optimal succinctness and efficiency of functional encryption and attribute-based encryptionUnbounded quadratic functional encryption and more from pairingsDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedOn the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generatorIdentity-based encryption in DDH hard groupsWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)(Inner-product) functional encryption with updatable ciphertextsCandidate witness encryption from lattice techniquesMulti-input attribute based encryption and predicate encryptionLockable obfuscation from circularly insecure fully homomorphic encryptionStreaming functional encryptionIndistinguishability obfuscationInner-product functional encryption with fine-grained access controlSuccinct LWE sampling, random polynomials, and obfuscationNIKE from affine determinant programsShort attribute-based signatures for arbitrary Turing machines from standard assumptionsCandidate iO from homomorphic encryption schemesObfustopia built on secret-key functional encryptionCandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEImpossibility results for lattice-based functional encryption schemesIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingNon-interactive distributional indistinguishability (NIDI) and non-malleable commitmentsFunctional encryption for attribute-weighted sums from \(k\)-LinAmplifying the security of functional encryption, unconditionallyFiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs






This page was built for publication: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)