Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
From MaRDI portal
Publication:5111369
Recommendations
- Implementing indistinguishability obfuscation using GGH15
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Cryptanalysis of the GGH cryptosystem
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem
- Cryptanalysis of GGH15 multilinear maps
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- scientific article; zbMATH DE number 566341
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Cryptographic implications of Hess' generalized GHS attack
- Aggregated differentials and cryptanalysis of PP-1 and GOST
Cited in
(19)- Matrix PRFs: constructions, attacks, and applications to obfuscation
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Implementing indistinguishability obfuscation using GGH15
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Collusion resistant traitor tracing from learning with errors
- On the complexity of compressing obfuscation
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Attribute based encryption for deterministic finite automata from DLIN
- Cryptanalysis of candidate obfuscators for affine determinant programs
- Candidate obfuscation via oblivious LWE sampling
- Obfustopia built on secret-key functional encryption
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem
- Quantum attacks against indistinguishablility obfuscators proved secure in the weak multilinear map model
- Constrained pseudorandom functions from functional encryption
- Witness encryption and null-iO from evasive LWE
- Preventing CLT attacks on obfuscation with linear overhead
This page was built for publication: Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5111369)