Candidate Multilinear Maps from Ideal Lattices

From MaRDI portal
Publication:4924400

DOI10.1007/978-3-642-38348-9_1zbMath1300.94055OpenAlexW1603256047MaRDI QIDQ4924400

Sanjam Garg, Craig Gentry, Shai Halevi

Publication date: 31 May 2013

Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_1




Related Items (only showing first 100 items - show all)

Tensors in computationsAdaptive Simulation Security for Inner Product Functional EncryptionFast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)Trapdoors for Ideal Lattices with ApplicationsSecure Multiparty RAM Computation in Constant RoundsPredicate Encryption for Circuits from LWEZeroizing Without Low-Level Zeroes: New MMAP Attacks and their LimitationsNew Multilinear Maps Over the IntegersIndistinguishability Obfuscation from Compact Functional EncryptionDelegating RAM Computations with Adaptive Soundness and PrivacyPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsSecure Obfuscation in a Weak Multilinear Map ModelCompactness vs Collusion Resistance in Functional EncryptionBad Directions in Cryptographic Hash FunctionsNTRU Fatigue: How Stretched is Overstretched?Multiparty noninteractive key exchange from ring key-homomorphic weak PRFsUnbounded quadratic functional encryption and more from pairingsBroadcast, trace and revoke with optimal parameters from polynomial hardnessBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linOn the security of functional encryption in the generic group modelA polynomial time algorithm for breaking NTRU encryption with multiple keysWitness encryption from smooth projective hashing systemAdaptive multiparty NIKEHomomorphic encryption: a mathematical surveyWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Lattice-based succinct arguments for NP with polylogarithmic-time verificationMultikey Fully Homomorphic Encryption and ApplicationsOn the hardness of the NTRU problemBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationConstrained (Verifiable) Pseudorandom Function from Functional EncryptionCHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear CaseCryptographic multilinear maps using pro-\(p\) groupsA survey on functional encryptionGenerating subgroups of ray class groups with small prime idealsLattice-based programmable hash functions and applicationsIndistinguishability obfuscationCiphertext-policy attribute-based encryption for general circuits from bilinear mapsTightly secure inner product functional encryption: multi-input and function-hiding constructionsPractical Order-Revealing Encryption with Limited LeakageDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsConstraining Pseudorandom Functions PrivatelyZeroizing Attacks on Indistinguishability Obfuscation over CLT13Separating IND-CPA and Circular Security for Unbounded Length Key CyclesProvably Secure NTRU Instances over Prime Cyclotomic RingsShort Generators Without Quantum Computers: The Case of MultiquadraticsComputing Generator in Cyclotomic Integer RingsRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsShort Stickelberger Class Relations and Application to Ideal-SVPConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEMulti-input Inner-Product Functional Encryption from PairingsOn Removing Graded Encodings from Functional EncryptionCandidate iO from homomorphic encryption schemesUnbounded inner product functional encryption from bilinear mapsDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessUnbounded inner product functional encryption from bilinear mapsFunctional Encryption for Cascade Automata (Extended Abstract)Minicrypt primitives with algebraic structure and applicationsTesting Isomorphism of Lattices over CM-OrdersSimultaneous diagonalization of incomplete matrices and applicationsHomomorphic EncryptionA Brief History of PairingsBreaking the Sub-Exponential Barrier in ObfustopiaLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program ObfuscatorsLower bounds on lattice sieving and information set decoding(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsEfficient subtree-based encryption for fuzzy-entity data sharingCutting-edge cryptography through the lens of secret sharingImpossibility of order-revealing encryption in idealized modelsA ciphertext-size lower bound for order-preserving encryption with limited leakageThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksPractical witness-key-agreement for blockchain-based dark pools financial tradingComments on ``Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegationCryptanalysis of candidate obfuscators for affine determinant programsOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsCryptanalysis of multilinear maps from ideal lattices: revisitedMatrix PRFs: constructions, attacks, and applications to obfuscationFrom FE combiners to secure MPC and backAttribute based encryption for deterministic finite automata from DLINNew approaches to traitor tracing with embedded identitiesAlgebraic generalization of Diffie-Hellman key exchangeOn the smoothing parameter and last minimum of random orthogonal latticesPost-quantum online voting schemeKey-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear MapsLattice Point Enumeration on Block Reduced BasesPASS-encrypt: a public key cryptosystem based on partial evaluation of polynomialsMultilinear maps from obfuscationOn virtual grey box obfuscation for general circuitsScalable zero knowledge via cycles of elliptic curvesMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsQANIZK for adversary-dependent languages and their applicationsMulti-input Functional Encryption with Unbounded-Message SecurityMultiparty non-interactive key exchange and more from isogenies on elliptic curvesCharacterizing overstretched NTRU attacks




This page was built for publication: Candidate Multilinear Maps from Ideal Lattices