Graph-induced multilinear maps from lattices
From MaRDI portal
Publication:5261689
DOI10.1007/978-3-662-46497-7_20zbMATH Open1315.94076OpenAlexW57039937MaRDI QIDQ5261689FDOQ5261689
Authors: Craig Gentry, Sergey Gorbunov, Shai Halevi
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_20
Recommendations
Cited In (67)
- Another round of breaking and making quantum money: how to not build it from lattices, and more
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
- Candidate iO from homomorphic encryption schemes
- Lattice-based succinct arguments for NP with polylogarithmic-time verification
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- A survey on functional encryption
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Candidate witness encryption from lattice techniques
- Obfustopia built on secret-key functional encryption
- How to construct quantum FHE, generically
- Adaptively sound zero-knowledge SNARKs for UP
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Generalized hardness assumption for self-bilinear map with auxiliary information
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Obfuscating finite automata
- Simultaneous diagonalization of incomplete matrices and applications
- Efficient obfuscation for CNF circuits and applications in cloud computing
- Tensors in computations
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Cutting-edge cryptography through the lens of secret sharing
- Return of GGH15: provable security against zeroizing attacks
- Traitor-tracing from LWE made simple and attribute-based
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- How to build time-lock encryption
- Multilinear maps from obfuscation
- Cryptanalysis of GGH15 multilinear maps
- Graded encoding schemes from obfuscation
- Watermarking cryptographic functionalities from standard lattice assumptions
- Delegating RAM computations with adaptive soundness and privacy
- Compactness vs collusion resistance in functional encryption
- Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
- Constraining pseudorandom functions privately
- Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps
- Lattice-based SNARGs and their application to more efficient obfuscation
- Private puncturable PRFs from standard lattice assumptions
- Practical order-revealing encryption with limited leakage
- Collusion resistant traitor tracing from learning with errors
- Algebraic generalization of Diffie-Hellman key exchange
- Implementing candidate graded encoding schemes from ideal lattices
- Cryptographic multilinear maps using pro-\(p\) groups
- Multilinear maps from obfuscation
- On the complexity of compressing obfuscation
- Cryptanalysis of candidate obfuscators for affine determinant programs
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries
- Candidate iO from homomorphic encryption schemes
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Candidate obfuscation via oblivious LWE sampling
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Homomorphic encryption
- Secure Obfuscation in a Weak Multilinear Map Model
- Proofs of Work from worst-case assumptions
- Constructions for quantum indistinguishability obfuscation
- Candidate Multilinear Maps from Ideal Lattices
- Universal proxy re-encryption
- A NOTE ON RECONSTRUCTION OF SPACES AND MAPS FROM LATTICE DATA
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Cryptanalysis of multilinear maps from ideal lattices: revisited
- Constrained pseudorandom functions from functional encryption
- Witness encryption and null-iO from evasive LWE
- Indistinguishability obfuscation: from approximate to exact
- Cryptanalyses of Candidate Branching Program Obfuscators
- Robust transforming combiners from indistinguishability obfuscation to functional encryption
- New approaches to traitor tracing with embedded identities
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
This page was built for publication: Graph-induced multilinear maps from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261689)