Cryptanalysis of GGH15 Multilinear Maps
From MaRDI portal
Publication:2829232
DOI10.1007/978-3-662-53008-5_21zbMATH Open1391.94739OpenAlexW2398614482MaRDI QIDQ2829232FDOQ2829232
Tancrède Lepoint, Moon Sung Lee, Mehdi Tibouchi, Jean-Sébastien Coron
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_21
Cites Work
- Title not available (Why is that?)
- New directions in cryptography
- Practical Multilinear Maps over the Integers
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Invertibility of random matrices: norm of the inverse
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Candidate Multilinear Maps from Ideal Lattices
- Cryptanalysis of GGH Map
- Cryptanalysis of the Multilinear Map over the Integers
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- New Multilinear Maps Over the Integers
- Cryptanalysis of GGH15 Multilinear Maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Graph-Induced Multilinear Maps from Lattices
- Cryptanalysis of the New CLT Multilinear Map over the Integers
Cited In (37)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Constraining Pseudorandom Functions Privately
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Lattice-based succinct arguments for NP with polylogarithmic-time verification
- Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
- Simultaneous diagonalization of incomplete matrices and applications
- Return of GGH15: provable security against zeroizing attacks
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- Multilinear maps from obfuscation
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- On the statistical leak of the GGH13 multilinear map and some variants
- Collusion Resistant Traitor Tracing from Learning with Errors
- Algebraic generalization of Diffie-Hellman key exchange
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Cryptanalysis of GGH15 Multilinear Maps
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- Candidate obfuscation via oblivious LWE sampling
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Combiners for functional encryption, unconditionally
- From FE combiners to secure MPC and back
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Constrained pseudorandom functions from functional encryption
- Witness encryption and null-iO from evasive LWE
- One-Way Functions and (Im)perfect Obfuscation
- Practical Order-Revealing Encryption with Limited Leakage
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Obfuscation Combiners
- Cryptanalyses of Candidate Branching Program Obfuscators
- On the security of functional encryption in the generic group model
- Cryptanalysis of CLT13 multilinear maps with independent slots
Uses Software
This page was built for publication: Cryptanalysis of GGH15 Multilinear Maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829232)