Pages that link to "Item:Q2845689"
From MaRDI portal
The following pages link to Practical Multilinear Maps over the Integers (Q2845689):
Displaying 50 items.
- Probability that the \(k\)-gcd of products of positive integers is \(B\)-friable (Q301413) (← links)
- Obfuscating conjunctions (Q514475) (← links)
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation (Q527147) (← links)
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Impossibility of order-revealing encryption in idealized models (Q1631321) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- Proofs of Work from worst-case assumptions (Q1673424) (← links)
- On virtual grey box obfuscation for general circuits (Q1688397) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Attribute-based fuzzy identity access control in multicloud computing environments (Q1800244) (← links)
- Efficient obfuscation for CNF circuits and applications in cloud computing (Q2001194) (← links)
- Algorithms for CRT-variant of approximate greatest common divisor problem (Q2025331) (← links)
- Obfuscating circuits via composite-order graded encoding (Q2039401) (← links)
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries (Q2051795) (← links)
- Candidate iO from homomorphic encryption schemes (Q2055602) (← links)
- Universal proxy re-encryption (Q2061932) (← links)
- A polynomial-time algorithm for solving the hidden subset sum problem (Q2096513) (← links)
- Revisiting orthogonal lattice attacks on approximate common divisor problems (Q2118873) (← links)
- Towards faster polynomial-time lattice reduction (Q2128584) (← links)
- Constructions for quantum indistinguishability obfuscation (Q2146070) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- New approaches to traitor tracing with embedded identities (Q2175935) (← links)
- Multilinear maps from obfuscation (Q2188963) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Cryptanalysis of multilinear maps from ideal lattices: revisited (Q2407051) (← links)
- Algebraic generalization of Diffie-Hellman key exchange (Q2413287) (← links)
- Cryptanalysis of the CLT13 multilinear map (Q2423847) (← links)
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions (Q2661695) (← links)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings (Q2790032) (← links)
- Indistinguishability Obfuscation: From Approximate to Exact (Q2796119) (← links)
- On the Correlation Intractability of Obfuscated Pseudorandom Functions (Q2796135) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- Perfect Structure on the Edge of Chaos (Q2796138) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Functional Encryption Without Obfuscation (Q2799106) (← links)
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits (Q2816296) (← links)
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information (Q2817818) (← links)
- Shorter Circuit Obfuscation in Challenging Security Models (Q2827739) (← links)
- Cryptanalysis of GGH15 Multilinear Maps (Q2829232) (← links)
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 (Q2829233) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- A Subfield Lattice Attack on Overstretched NTRU Assumptions (Q2835586) (← links)
- Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps (Q2947114) (← links)