Witness encryption and null-iO from evasive LWE
From MaRDI portal
Publication:6135397
DOI10.1007/978-3-031-22963-3_7zbMath1519.94190OpenAlexW4317928226MaRDI QIDQ6135397
Daniel Wichs, Hoeteck Wee, Vinod Vaikuntanathan
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22963-3_7
Related Items (4)
Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Multi-authority ABE from lattices without random oracles ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Constant input attribute based (and predicate) encryption from evasive and tensor LWE
Cites Work
- Unnamed Item
- Quantum attacks against indistinguishablility obfuscators proved secure in the weak multilinear map model
- Return of GGH15: provable security against zeroizing attacks
- Lower bounds on obfuscation from all-or-nothing encryption primitives
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Candidate iO from homomorphic encryption schemes
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- On perfect correctness in (lockable) obfuscation
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- Candidate obfuscation via oblivious LWE sampling
- Counterexamples to new circular security assumptions underlying iO
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- Succinct LWE sampling, random polynomials, and obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of GGH15 Multilinear Maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Key Homomorphic PRFs and Their Applications
- Hardness of k-LWE and Applications in Traitor Tracing
- Witness Encryption from Instance Independent Assumptions
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Pseudorandom Functions and Lattices
- Cryptanalysis of the Multilinear Map over the Integers
- Secure Obfuscation in a Weak Multilinear Map Model
- New Multilinear Maps Over the Integers
- Indistinguishability Obfuscation from Compact Functional Encryption
- Indistinguishability Obfuscation from Functional Encryption
- Candidate Multilinear Maps from Ideal Lattices
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Collusion resistant traitor tracing from learning with errors
- Graph-Induced Multilinear Maps from Lattices
- Cryptanalyses of Candidate Branching Program Obfuscators
- Witness encryption and its applications
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Indistinguishability obfuscation from well-founded assumptions
- Indistinguishability obfuscation from circular security
- Candidate witness encryption from lattice techniques
This page was built for publication: Witness encryption and null-iO from evasive LWE