Cryptanalysis of GGH Map
From MaRDI portal
Publication:2820496
DOI10.1007/978-3-662-49890-3_21zbMath1385.94044OpenAlexW2295328551MaRDI QIDQ2820496
Publication date: 9 September 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49890-3_21
Related Items (50)
(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks ⋮ Secure Obfuscation in a Weak Multilinear Map Model ⋮ Towards breaking the exponential barrier for general secret sharing ⋮ Cryptanalysis of candidate obfuscators for affine determinant programs ⋮ Cryptanalysis of multilinear maps from ideal lattices: revisited ⋮ From minicrypt to obfustopia via private-key functional encryption ⋮ From FE combiners to secure MPC and back ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ Multilinear maps from obfuscation ⋮ On virtual grey box obfuscation for general circuits ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications ⋮ Cryptanalysis of the CLT13 multilinear map ⋮ Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \) ⋮ Lattice-based programmable hash functions and applications ⋮ An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero ⋮ Ciphertext-policy attribute-based encryption for general circuits from bilinear maps ⋮ One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Practical Order-Revealing Encryption with Limited Leakage ⋮ Approximate short vectors in ideal lattices of \(\mathbb{Q}(\zeta_{p^e})\) with precomputation of \({\mathrm {Cl}}(\mathcal{O}_K)\) ⋮ Obfuscating conjunctions ⋮ Efficient obfuscation for CNF circuits and applications in cloud computing ⋮ Constraining Pseudorandom Functions Privately ⋮ Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 ⋮ Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Candidate iO from homomorphic encryption schemes ⋮ Indistinguishability Obfuscation: From Approximate to Exact ⋮ How to build time-lock encryption ⋮ Can PPAD hardness be based on standard cryptographic assumptions? ⋮ Constrained pseudorandom functions from functional encryption ⋮ New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries ⋮ Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information ⋮ Candidate iO from homomorphic encryption schemes ⋮ Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE ⋮ Combiners for functional encryption, unconditionally ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ Cryptanalysis of GGH15 Multilinear Maps ⋮ Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation ⋮ Simultaneous diagonalization of incomplete matrices and applications ⋮ Fast reduction of algebraic lattices over cyclotomic fields
This page was built for publication: Cryptanalysis of GGH Map