Cryptanalysis of GGH15 multilinear maps
From MaRDI portal
Publication:2829232
DOI10.1007/978-3-662-53008-5_21zbMATH Open1391.94739OpenAlexW2398614482MaRDI QIDQ2829232FDOQ2829232
Authors: Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_21
Recommendations
Cites Work
- New directions in cryptography
- Title not available (Why is that?)
- Practical multilinear maps over the integers
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Invertibility of random matrices: norm of the inverse
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Candidate Multilinear Maps from Ideal Lattices
- Cryptanalysis of GGH map
- Cryptanalysis of the multilinear map over the integers
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- New Multilinear Maps Over the Integers
- Cryptanalysis of GGH15 multilinear maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Graph-induced multilinear maps from lattices
- Cryptanalysis of the new CLT multilinear map over the integers
Cited In (40)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Lattice-based succinct arguments for NP with polylogarithmic-time verification
- Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures
- Simultaneous diagonalization of incomplete matrices and applications
- Cryptanalysis of GGH map
- Return of GGH15: provable security against zeroizing attacks
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- Multilinear maps from obfuscation
- Cryptanalysis of GGH15 multilinear maps
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
- On the statistical leak of the GGH13 multilinear map and some variants
- Constraining pseudorandom functions privately
- Practical order-revealing encryption with limited leakage
- Collusion resistant traitor tracing from learning with errors
- Algebraic generalization of Diffie-Hellman key exchange
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Functional encryption: deterministic to randomized functions from simple assumptions
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- Cryptanalysis of the GGH cryptosystem
- Candidate obfuscation via oblivious LWE sampling
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Combiners for functional encryption, unconditionally
- From FE combiners to secure MPC and back
- Obfuscation combiners
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Cryptanalysis of multilinear maps from ideal lattices: revisited
- Constrained pseudorandom functions from functional encryption
- Witness encryption and null-iO from evasive LWE
- One-Way Functions and (Im)perfect Obfuscation
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Cryptanalyses of Candidate Branching Program Obfuscators
- Robust transforming combiners from indistinguishability obfuscation to functional encryption
- On the security of functional encryption in the generic group model
- Cryptanalysis of CLT13 multilinear maps with independent slots
Uses Software
This page was built for publication: Cryptanalysis of GGH15 multilinear maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829232)