Pages that link to "Item:Q2829232"
From MaRDI portal
The following pages link to Cryptanalysis of GGH15 Multilinear Maps (Q2829232):
Displaying 36 items.
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures (Q1015359) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- On the statistical leak of the GGH13 multilinear map and some variants (Q1633467) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- Combiners for functional encryption, unconditionally (Q2055605) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- From FE combiners to secure MPC and back (Q2175912) (← links)
- Cryptanalysis of CLT13 multilinear maps with independent slots (Q2176656) (← links)
- Multilinear maps from obfuscation (Q2188963) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Algebraic generalization of Diffie-Hellman key exchange (Q2413287) (← links)
- Obfuscation Combiners (Q2829229) (← links)
- Cryptanalysis of GGH15 Multilinear Maps (Q2829232) (← links)
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 (Q2829233) (← links)
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero (Q2971014) (← links)
- Practical Order-Revealing Encryption with Limited Leakage (Q4639494) (← links)
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 (Q5111369) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Cryptanalyses of Candidate Branching Program Obfuscators (Q5270365) (← links)
- Constraining Pseudorandom Functions Privately (Q5738766) (← links)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 (Q5738782) (← links)
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption (Q5738872) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions (Q5738969) (← links)
- Simultaneous diagonalization of incomplete matrices and applications (Q5853794) (← links)
- One-Way Functions and (Im)perfect Obfuscation (Q5885583) (← links)
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs (Q6057185) (← links)
- On the security of functional encryption in the generic group model (Q6095189) (← links)
- Witness encryption and null-iO from evasive LWE (Q6135397) (← links)
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case (Q6163662) (← links)