Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
From MaRDI portal
Publication:2829233
DOI10.1007/978-3-662-53008-5_22zbMATH Open1391.94782OpenAlexW2500250645MaRDI QIDQ2829233FDOQ2829233
Mark Zhandry, Amit Sahai, Eric Miles
Publication date: 27 October 2016
Published in: Advances in Cryptology β CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_22
Cites Work
- Practical Multilinear Maps over the Integers
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Candidate Multilinear Maps from Ideal Lattices
- Cryptanalysis of GGH Map
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- A Subfield Lattice Attack on Overstretched NTRU Assumptions
- Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
- Secure Obfuscation in a Weak Multilinear Map Model
- Protecting Obfuscation against Algebraic Attacks
- Recovering Short Generators of Principal Ideals in Cyclotomic Rings
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
Cited In (51)
- Time-lock puzzles from lattices
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
- From Minicrypt to Obfustopia via Private-Key Functional Encryption
- On Removing Graded Encodings from Functional Encryption
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps
- Candidate iO from homomorphic encryption schemes
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Efficient obfuscation for CNF circuits and applications in cloud computing
- Functional encryption for cascade automata
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Towards breaking the exponential barrier for general secret sharing
- Multilinear maps from obfuscation
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
- Two-round concurrent 2PC from sub-exponential LWE
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- On the statistical leak of the GGH13 multilinear map and some variants
- Collusion Resistant Traitor Tracing from Learning with Errors
- From minicrypt to obfustopia via private-key functional encryption
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Can PPAD hardness be based on standard cryptographic assumptions?
- On the complexity of compressing obfuscation
- Cryptanalysis of GGH15 Multilinear Maps
- Attribute based encryption for deterministic finite automata from DLIN
- Indistinguishability obfuscation
- Strong Hardness of Privacy from Weak Traitor Tracing
- Multi-input Functional Encryption with Unbounded-Message Security
- Obfustopia built on secret-key functional encryption
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model
- Cryptanalysis of candidate obfuscators for affine determinant programs
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- Candidate iO from homomorphic encryption schemes
- Optimal broadcast encryption from pairings and LWE
- Candidate obfuscation via oblivious LWE sampling
- Delegating RAM Computations with Adaptive Soundness and Privacy
- Secure Obfuscation in a Weak Multilinear Map Model
- Proofs of Work from worst-case assumptions
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- The Complexity of Public-Key Cryptography
- Constrained pseudorandom functions from functional encryption
- Witness encryption and null-iO from evasive LWE
- One-Way Functions and (Im)perfect Obfuscation
- Shorter Circuit Obfuscation in Challenging Security Models
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Obfuscation Combiners
- Cryptanalyses of Candidate Branching Program Obfuscators
Recommendations
- Cryptanalysis of GGH15 Multilinear Maps π π
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 π π
- Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map π π
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks π π
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem π π
- Cryptanalysis of the CLT13 multilinear map π π
- Cryptanalysis of the Multilinear Map over the Integers π π
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE π π
- Cryptanalysis of multilinear maps from ideal lattices: revisited π π
- Cryptanalysis of CLT13 multilinear maps with independent slots π π
This page was built for publication: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829233)