Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptanalysis of the New CLT Multilinear Map over the Integers - MaRDI portal

Cryptanalysis of the New CLT Multilinear Map over the Integers

From MaRDI portal
Publication:2820495

DOI10.1007/978-3-662-49890-3_20zbMath1385.94020OpenAlexW2470510195MaRDI QIDQ2820495

Jung Hee Cheon, Brice Minaud, Changmin Lee, Hansol Ryu, Pierre-Alain Fouque

Publication date: 9 September 2016

Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49890-3_20



Related Items

The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksCryptanalysis of multilinear maps from ideal lattices: revisitedFrom minicrypt to obfustopia via private-key functional encryptionAttribute based encryption for deterministic finite automata from DLINMultilinear maps from obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsOn the security of functional encryption in the generic group modelCryptanalysis of the CLT13 multilinear mapPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Lattice-based succinct arguments for NP with polylogarithmic-time verificationAn algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zeroPublic key encryption with equality test from generic assumptions in the random oracle modelCollusion Resistant Traitor Tracing from Learning with ErrorsPractical Order-Revealing Encryption with Limited LeakageEfficient obfuscation for CNF circuits and applications in cloud computingDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsConstraining Pseudorandom Functions PrivatelyRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsFunctional encryption for cascade automataCan PPAD hardness be based on standard cryptographic assumptions?Constrained pseudorandom functions from functional encryptionGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationOptimal broadcast encryption from pairings and LWECryptanalysis of GGH15 Multilinear MapsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation