Graph-Induced Multilinear Maps from Lattices
From MaRDI portal
Publication:5261689
DOI10.1007/978-3-662-46497-7_20zbMATH Open1315.94076OpenAlexW57039937MaRDI QIDQ5261689FDOQ5261689
Sergey Gorbunov, Shai Halevi, Craig Gentry
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_20
Cited In (65)
- Another round of breaking and making quantum money: how to not build it from lattices, and more
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
- Candidate iO from homomorphic encryption schemes
- Lattice-based succinct arguments for NP with polylogarithmic-time verification
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- A survey on functional encryption
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Candidate witness encryption from lattice techniques
- Obfustopia built on secret-key functional encryption
- How to construct quantum FHE, generically
- Adaptively sound zero-knowledge SNARKs for UP
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Constraining Pseudorandom Functions Privately
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps
- Private Puncturable PRFs from Standard Lattice Assumptions
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Obfuscating finite automata
- Indistinguishability Obfuscation: From Approximate to Exact
- Simultaneous diagonalization of incomplete matrices and applications
- Efficient obfuscation for CNF circuits and applications in cloud computing
- Tensors in computations
- Homomorphic Encryption
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Cutting-edge cryptography through the lens of secret sharing
- Return of GGH15: provable security against zeroizing attacks
- Traitor-tracing from LWE made simple and attribute-based
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks
- How to build time-lock encryption
- Multilinear maps from obfuscation
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
- Watermarking cryptographic functionalities from standard lattice assumptions
- Collusion Resistant Traitor Tracing from Learning with Errors
- Algebraic generalization of Diffie-Hellman key exchange
- Cryptographic multilinear maps using pro-\(p\) groups
- On the complexity of compressing obfuscation
- Cryptanalysis of GGH15 Multilinear Maps
- Multilinear Maps from Obfuscation
- Cryptanalysis of candidate obfuscators for affine determinant programs
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries
- Candidate iO from homomorphic encryption schemes
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Candidate obfuscation via oblivious LWE sampling
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Compactness vs Collusion Resistance in Functional Encryption
- Delegating RAM Computations with Adaptive Soundness and Privacy
- Secure Obfuscation in a Weak Multilinear Map Model
- Proofs of Work from worst-case assumptions
- Constructions for quantum indistinguishability obfuscation
- Candidate Multilinear Maps from Ideal Lattices
- Universal proxy re-encryption
- A NOTE ON RECONSTRUCTION OF SPACES AND MAPS FROM LATTICE DATA
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Cryptanalysis of multilinear maps from ideal lattices: revisited
- Constrained pseudorandom functions from functional encryption
- Witness encryption and null-iO from evasive LWE
- Practical Order-Revealing Encryption with Limited Leakage
- Cryptanalyses of Candidate Branching Program Obfuscators
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
- New approaches to traitor tracing with embedded identities
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
This page was built for publication: Graph-Induced Multilinear Maps from Lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261689)