Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations

From MaRDI portal
Publication:3457113


DOI10.1007/978-3-662-47989-6_12zbMath1375.94114MaRDI QIDQ3457113

Mariana Raykova, Shai Halevi, Hemanta K. Maji, Craig Gentry, Amit Sahai, Tancrède Lepoint, Mehdi Tibouchi, Eric Miles, Jean-Sébastien Coron

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: http://orbilu.uni.lu/handle/10993/24863


94A60: Cryptography


Related Items

Practical Order-Revealing Encryption with Limited Leakage, Collusion Resistant Traitor Tracing from Learning with Errors, Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption, Cryptanalyses of Candidate Branching Program Obfuscators, On the complexity of compressing obfuscation, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Constraining Pseudorandom Functions Privately, Zeroizing Attacks on Indistinguishability Obfuscation over CLT13, Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption, From Minicrypt to Obfustopia via Private-Key Functional Encryption, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, On Removing Graded Encodings from Functional Encryption, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Obfustopia built on secret-key functional encryption, Can PPAD hardness be based on standard cryptographic assumptions?, One-Way Functions and (Im)perfect Obfuscation, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Obfuscating conjunctions, (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps, The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks, On virtual grey box obfuscation for general circuits, How to build time-lock encryption, Efficient obfuscation for CNF circuits and applications in cloud computing, Functional encryption for cascade automata, Optimal broadcast encryption from pairings and LWE, Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE, Combiners for functional encryption, unconditionally, From minicrypt to obfustopia via private-key functional encryption, From FE combiners to secure MPC and back, Attribute based encryption for deterministic finite automata from DLIN, Multilinear maps from obfuscation, Constrained pseudorandom functions from functional encryption, Cryptanalysis of the CLT13 multilinear map, Indistinguishability Obfuscation: From Approximate to Exact, Multilinear Maps from Obfuscation, Functional Encryption Without Obfuscation, Shorter Circuit Obfuscation in Challenging Security Models, Obfuscation Combiners, Cryptanalysis of GGH15 Multilinear Maps, Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13, Circular Security Separations for Arbitrary Length Cycles from LWE, Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Strong Hardness of Privacy from Weak Traitor Tracing, Delegating RAM Computations with Adaptive Soundness and Privacy, Secure Obfuscation in a Weak Multilinear Map Model, Compactness vs Collusion Resistance in Functional Encryption



Cites Work