Cryptanalysis of the Multilinear Map over the Integers

From MaRDI portal
Publication:2948321

DOI10.1007/978-3-662-46800-5_1zbMath1365.94416OpenAlexW3121827341MaRDI QIDQ2948321

Damien Stehlé, Kyoohyung Han, Hansol Ryu, Changmin Lee, Jung Hee Cheon

Publication date: 30 September 2015

Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_1




Related Items

(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksSecure Obfuscation in a Weak Multilinear Map ModelCompactness vs Collusion Resistance in Functional EncryptionSurvey of information securityAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceBad Directions in Cryptographic Hash FunctionsCryptanalysis of candidate obfuscators for affine determinant programsOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsCryptanalysis of multilinear maps from ideal lattices: revisitedFrom minicrypt to obfustopia via private-key functional encryptionProofs of Work from worst-case assumptionsFrom FE combiners to secure MPC and backAttribute based encryption for deterministic finite automata from DLINAlgebraic generalization of Diffie-Hellman key exchangeThe random oracle model: a twenty-year retrospectiveMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsMultilinear maps from obfuscationOn virtual grey box obfuscation for general circuitsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applications(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linOn the security of functional encryption in the generic group modelCryptanalysis of the CLT13 multilinear mapWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)A survey on functional encryptionLattice-based programmable hash functions and applicationsIndistinguishability obfuscationCollusion Resistant Traitor Tracing from Learning with ErrorsPractical Order-Revealing Encryption with Limited LeakageObfuscating conjunctionsEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsConstraining Pseudorandom Functions PrivatelyZeroizing Attacks on Indistinguishability Obfuscation over CLT13Short Generators Without Quantum Computers: The Case of MultiquadraticsRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsFunctional encryption for cascade automataCandidate iO from homomorphic encryption schemesAlgorithms for CRT-variant of approximate greatest common divisor problemIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsMultilinear Maps from ObfuscationCryptographic Assumptions: A Position PaperHow to build time-lock encryptionFunctional Encryption Without ObfuscationContention in Cryptoland: Obfuscation, Leakage and UCECan PPAD hardness be based on standard cryptographic assumptions?What is the Future of Cryptography?Constrained pseudorandom functions from functional encryptionNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationOptimal broadcast encryption from pairings and LWECandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECombiners for functional encryption, unconditionallyCandidate obfuscation via oblivious LWE samplingShorter Circuit Obfuscation in Challenging Security ModelsObfuscation CombinersCryptanalysis of GGH15 Multilinear MapsCircular Security Separations for Arbitrary Length Cycles from LWEProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesFully Secure Functional Encryption for Inner Products, from Standard AssumptionsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationSimultaneous diagonalization of incomplete matrices and applicationsSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionCryptanalyses of Candidate Branching Program Obfuscators