Cryptanalysis of the Multilinear Map over the Integers
From MaRDI portal
Publication:2948321
DOI10.1007/978-3-662-46800-5_1zbMATH Open1365.94416OpenAlexW3121827341MaRDI QIDQ2948321FDOQ2948321
Damien Stehlé, Kyoohyung Han, Hansol Ryu, C.-M. Lee, Jung Hee Cheon
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_1
Cited In (83)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Constraining Pseudorandom Functions Privately
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- From Minicrypt to Obfustopia via Private-Key Functional Encryption
- On Removing Graded Encodings from Functional Encryption
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Indistinguishability Obfuscation: From Approximate to Exact
- Cryptanalysis of the CLT13 multilinear map
- Efficient obfuscation for CNF circuits and applications in cloud computing
- Functional encryption for cascade automata
- Short Generators Without Quantum Computers: The Case of Multiquadratics
- Return of GGH15: provable security against zeroizing attacks
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- How to build time-lock encryption
- Multilinear maps from obfuscation
- Survey of information security
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- Algorithms for CRT-variant of approximate greatest common divisor problem
- Algebraic generalization of Diffie-Hellman key exchange
- Multidimensional linear cryptanalysis
- From minicrypt to obfustopia via private-key functional encryption
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
- On the complexity of compressing obfuscation
- Circular Security Separations for Arbitrary Length Cycles from LWE
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- The random oracle model: a twenty-year retrospective
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Functional Encryption Without Obfuscation
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Cryptanalysis of GGH15 Multilinear Maps
- Cryptographic Assumptions: A Position Paper
- Multilinear Maps from Obfuscation
- Attribute based encryption for deterministic finite automata from DLIN
- On the Correlation Intractability of Obfuscated Pseudorandom Functions
- Cryptanalysis of candidate obfuscators for affine determinant programs
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries
- Candidate iO from homomorphic encryption schemes
- Optimal broadcast encryption from pairings and LWE
- Candidate obfuscation via oblivious LWE sampling
- Compactness vs Collusion Resistance in Functional Encryption
- Secure Obfuscation in a Weak Multilinear Map Model
- Proofs of Work from worst-case assumptions
- Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption
- Combiners for functional encryption, unconditionally
- From FE combiners to secure MPC and back
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- On virtual grey box obfuscation for general circuits
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Cryptanalysis of multilinear maps from ideal lattices: revisited
- Constrained pseudorandom functions from functional encryption
- Contention in Cryptoland: Obfuscation, Leakage and UCE
- Witness encryption and null-iO from evasive LWE
- Practical Order-Revealing Encryption with Limited Leakage
- Shorter Circuit Obfuscation in Challenging Security Models
- Obfuscation Combiners
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Obfuscating conjunctions
- Cryptanalyses of Candidate Branching Program Obfuscators
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
- Cryptanalysis of CLT13 multilinear maps with independent slots
- Bad Directions in Cryptographic Hash Functions
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
- Candidate iO from homomorphic encryption schemes
- Simultaneous diagonalization of incomplete matrices and applications
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Two-round concurrent 2PC from sub-exponential LWE
- Collusion Resistant Traitor Tracing from Learning with Errors
- A survey on functional encryption
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Can PPAD hardness be based on standard cryptographic assumptions?
- Lattice-based programmable hash functions and applications
- What is the Future of Cryptography?
- Indistinguishability obfuscation
- A general framework for lattice-based ABE using evasive inner-product functional encryption
- Time-lock puzzles from lattices
- On the security of functional encryption in the generic group model
This page was built for publication: Cryptanalysis of the Multilinear Map over the Integers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948321)