Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum iO
From MaRDI portal
Publication:6138084
Recommendations
- Candidate obfuscation via oblivious LWE sampling
- Lower bounds on assumptions behind indistinguishability obfuscation
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
Cites work
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- scientific article; zbMATH DE number 7650430 (Why is no real title available?)
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Candidate Multilinear Maps from Ideal Lattices
- Candidate iO from homomorphic encryption schemes
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Candidate obfuscation via oblivious LWE sampling
- Constant-round concurrent zero-knowledge from indistinguishability obfuscation
- Counterexamples to new circular security assumptions underlying iO
- Cryptanalysis of GGH map
- Cryptanalysis of the multilinear map over the integers
- Cryptanalysis of the new CLT multilinear map over the integers
- From cryptomania to obfustopia through secret-key functional encryption
- Graph-induced multilinear maps from lattices
- Hardness of SIS and LWE with small parameters
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- How to use indistinguishability obfuscation
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
- Indistinguishability obfuscation from circular security
- Indistinguishability obfuscation from compact functional encryption
- Indistinguishability obfuscation from constant-degree graded encoding schemes
- Indistinguishability obfuscation from functional encryption
- Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
- Indistinguishability obfuscation from well-founded assumptions
- Indistinguishability obfuscation with non-trivial efficiency
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation)
- Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation
- Multi-input functional encryption
- Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
- New Multilinear Maps Over the Integers
- Obfuscation of probabilistic circuits and applications
- Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits
- Practical multilinear maps over the integers
- Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps
- Protecting obfuscation against algebraic attacks
- Secure Arithmetic Computation with No Honest Majority
- Succinct LWE sampling, random polynomials, and obfuscation
- Sum-of-squares meets program obfuscation, revisited
- Verifiable functional encryption
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Cited in
(1)
This page was built for publication: Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6138084)