Cryptanalysis of GGH15 Multilinear Maps
From MaRDI portal
Publication:2829232
DOI10.1007/978-3-662-53008-5_21zbMath1391.94739OpenAlexW2398614482MaRDI QIDQ2829232
Tancrède Lepoint, Moon Sung Lee, Mehdi Tibouchi, Jean-Sébastien Coron
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_21
Related Items (32)
One-Way Functions and (Im)perfect Obfuscation ⋮ (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps ⋮ The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks ⋮ Return of GGH15: provable security against zeroizing attacks ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Optimal broadcast encryption and CP-ABE from evasive lattice assumptions ⋮ From FE combiners to secure MPC and back ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ Multilinear maps from obfuscation ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications ⋮ On the security of functional encryption in the generic group model ⋮ Witness encryption and null-iO from evasive LWE ⋮ Lattice-based succinct arguments for NP with polylogarithmic-time verification ⋮ CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case ⋮ An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Practical Order-Revealing Encryption with Limited Leakage ⋮ Constraining Pseudorandom Functions Privately ⋮ Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 ⋮ Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Constrained pseudorandom functions from functional encryption ⋮ Combiners for functional encryption, unconditionally ⋮ Candidate obfuscation via oblivious LWE sampling ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ Obfuscation Combiners ⋮ Cryptanalysis of GGH15 Multilinear Maps ⋮ Simultaneous diagonalization of incomplete matrices and applications ⋮ Cryptanalyses of Candidate Branching Program Obfuscators
Uses Software
Cites Work
- Unnamed Item
- Invertibility of random matrices: norm of the inverse
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of the New CLT Multilinear Map over the Integers
- Cryptanalysis of GGH Map
- Cryptanalysis of GGH15 Multilinear Maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Practical Multilinear Maps over the Integers
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Cryptanalysis of the Multilinear Map over the Integers
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- New Multilinear Maps Over the Integers
- New directions in cryptography
- Candidate Multilinear Maps from Ideal Lattices
- Graph-Induced Multilinear Maps from Lattices
This page was built for publication: Cryptanalysis of GGH15 Multilinear Maps