Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
From MaRDI portal
Publication:5111369
DOI10.4230/LIPICS.ICALP.2017.38zbMATH Open1441.94068OpenAlexW2741823356MaRDI QIDQ5111369FDOQ5111369
Nico Döttling, Daniel Apon, Sanjam Garg, Pratyay Mukherjee
Publication date: 27 May 2020
Full work available at URL: https://dblp.uni-trier.de/db/conf/icalp/icalp2017.html#AponDGM17
Recommendations
- Implementing indistinguishability obfuscation using GGH15
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Cryptanalysis of the GGH cryptosystem
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem
- Cryptanalysis of GGH15 multilinear maps
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- scientific article; zbMATH DE number 566341
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Cryptographic implications of Hess' generalized GHS attack
- Aggregated differentials and cryptanalysis of PP-1 and GOST
Cryptography (94A60) Data structures (68P05) Networks and circuits as models of computation; circuit complexity (68Q06)
Cited In (13)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Collusion Resistant Traitor Tracing from Learning with Errors
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- On the complexity of compressing obfuscation
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Attribute based encryption for deterministic finite automata from DLIN
- Obfustopia built on secret-key functional encryption
- Candidate obfuscation via oblivious LWE sampling
- Constrained pseudorandom functions from functional encryption
- Witness encryption and null-iO from evasive LWE
This page was built for publication: Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5111369)