Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptanalysis of GGH15 Multilinear Maps - MaRDI portal

Cryptanalysis of GGH15 Multilinear Maps

From MaRDI portal
Publication:2829232

DOI10.1007/978-3-662-53008-5_21zbMath1391.94739OpenAlexW2398614482MaRDI QIDQ2829232

Tancrède Lepoint, Moon Sung Lee, Mehdi Tibouchi, Jean-Sébastien Coron

Publication date: 27 October 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_21




Related Items (32)

One-Way Functions and (Im)perfect Obfuscation(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsFrom FE combiners to secure MPC and backAlgebraic generalization of Diffie-Hellman key exchangeMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsMultilinear maps from obfuscationMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsOn the security of functional encryption in the generic group modelWitness encryption and null-iO from evasive LWELattice-based succinct arguments for NP with polylogarithmic-time verificationCHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear CaseAn algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zeroCollusion Resistant Traitor Tracing from Learning with ErrorsPractical Order-Revealing Encryption with Limited LeakageConstraining Pseudorandom Functions PrivatelyZeroizing Attacks on Indistinguishability Obfuscation over CLT13Robust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsConstrained pseudorandom functions from functional encryptionCombiners for functional encryption, unconditionallyCandidate obfuscation via oblivious LWE samplingChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionObfuscation CombinersCryptanalysis of GGH15 Multilinear MapsSimultaneous diagonalization of incomplete matrices and applicationsCryptanalyses of Candidate Branching Program Obfuscators


Uses Software


Cites Work


This page was built for publication: Cryptanalysis of GGH15 Multilinear Maps