GGH15 beyond permutation branching programs: proofs, attacks, and candidates

From MaRDI portal
Publication:1784107

DOI10.1007/978-3-319-96881-0_20zbMath1436.94046OpenAlexW2807695933MaRDI QIDQ1784107

Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee

Publication date: 26 September 2018

Full work available at URL: https://hdl.handle.net/1721.1/137867




Related Items (30)

Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsObfuscating finite automataTraitor-tracing from LWE made simple and attribute-basedReturn of GGH15: provable security against zeroizing attacksSimpler constructions of asymmetric primitives from obfuscationAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsMatrix PRFs: constructions, attacks, and applications to obfuscationPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessConstrained pseudorandom functions from homomorphic secret sharingMulti-authority ABE from lattices without random oraclesWitness encryption and null-iO from evasive LWECandidate witness encryption from lattice techniquesLockable obfuscation from circularly insecure fully homomorphic encryptionHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreAdaptively secure inner product encryption from LWEABE for DFA from LWE against bounded collusions, revisitedCollusion Resistant Traitor Tracing from Learning with ErrorsWatermarking cryptographic functionalities from standard lattice assumptionsObfustopia built on secret-key functional encryptionIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsAdaptively secure constrained pseudorandom functions in the standard modelCollusion resistant watermarkable PRFs from standard assumptionsOn succinct arguments and witness encryption from groups(Commit-and-prove) predictable arguments with privacyWeak Zero-Knowledge beyond the Black-Box Barrier




This page was built for publication: GGH15 beyond permutation branching programs: proofs, attacks, and candidates