Secure Obfuscation in a Weak Multilinear Map Model

From MaRDI portal
Publication:3181029

DOI10.1007/978-3-662-53644-5_10zbMath1397.94064OpenAlexW2532623575MaRDI QIDQ3181029

Amit Sahai, Akshayaram Srinivasan, Pratyay Mukherjee, Eric Miles, Mark Zhandry, Sanjam Garg

Publication date: 22 December 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53644-5_10




Related Items (26)

One-Way Functions and (Im)perfect ObfuscationSecure computation from one-way noisy communication, or: anti-correlation via anti-concentrationCounterexamples to new circular security assumptions underlying iOThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksAttribute-based access control for inner product functional encryption from LWESecure Obfuscation in a Weak Multilinear Map ModelOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsMatrix PRFs: constructions, attacks, and applications to obfuscationPublic-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applicationsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsWitness encryption and null-iO from evasive LWEEfficient obfuscation for CNF circuits and applications in cloud computingConstraining Pseudorandom Functions PrivatelyZeroizing Attacks on Indistinguishability Obfuscation over CLT13Robust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsCandidate iO from homomorphic encryption schemesObfustopia built on secret-key functional encryptionCandidate iO from homomorphic encryption schemesIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationCryptanalyses of Candidate Branching Program Obfuscators



Cites Work


This page was built for publication: Secure Obfuscation in a Weak Multilinear Map Model