Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps

From MaRDI portal
Publication:5738874


DOI10.1007/978-3-319-56620-7_6zbMath1411.94046MaRDI QIDQ5738874

Amit Sahai, Prabhanjan V. Ananth

Publication date: 13 June 2017

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)



Related Items

One-Way Functions and (Im)perfect Obfuscation, A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials, The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO, FE and iO for Turing machines from minimal assumptions, Simpler constructions of asymmetric primitives from obfuscation, Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\), From cryptomania to obfustopia through secret-key functional encryption, From FE combiners to secure MPC and back, Attribute based encryption for deterministic finite automata from DLIN, Multilinear maps from obfuscation, Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, On the security of functional encryption in the generic group model, Multi-client functional encryption with fine-grained access control, Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \), A survey on functional encryption, Generic construction of trace-and-revoke inner product functional encryption, Streaming functional encryption, Indistinguishability obfuscation, Inner-product functional encryption with fine-grained access control, On the complexity of compressing obfuscation, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, On Removing Graded Encodings from Functional Encryption, Candidate iO from homomorphic encryption schemes, Obfustopia built on secret-key functional encryption, Constrained pseudorandom functions from functional encryption, Simple and efficient FE for quadratic functions, Candidate iO from homomorphic encryption schemes, Combiners for functional encryption, unconditionally, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification, Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation, Amplifying the security of functional encryption, unconditionally, Lattice-Based SNARGs and Their Application to More Efficient Obfuscation



Cites Work