Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
From MaRDI portal
Publication:3457113
DOI10.1007/978-3-662-47989-6_12zbMath1375.94114OpenAlexW1462154385MaRDI QIDQ3457113
Mariana Raykova, Shai Halevi, Hemanta K. Maji, Craig Gentry, Amit Sahai, Tancrède Lepoint, Mehdi Tibouchi, Eric Miles, Jean-Sébastien Coron
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://orbilu.uni.lu/handle/10993/24863
Related Items (49)
One-Way Functions and (Im)perfect Obfuscation ⋮ (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps ⋮ The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks ⋮ Strong Hardness of Privacy from Weak Traitor Tracing ⋮ Delegating RAM Computations with Adaptive Soundness and Privacy ⋮ Secure Obfuscation in a Weak Multilinear Map Model ⋮ Compactness vs Collusion Resistance in Functional Encryption ⋮ From minicrypt to obfustopia via private-key functional encryption ⋮ From FE combiners to secure MPC and back ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Multilinear maps from obfuscation ⋮ On virtual grey box obfuscation for general circuits ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Cryptanalysis of the CLT13 multilinear map ⋮ Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \) ⋮ Lattice-based succinct arguments for NP with polylogarithmic-time verification ⋮ Lattice-based programmable hash functions and applications ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Practical Order-Revealing Encryption with Limited Leakage ⋮ Obfuscating conjunctions ⋮ Efficient obfuscation for CNF circuits and applications in cloud computing ⋮ On the complexity of compressing obfuscation ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Constraining Pseudorandom Functions Privately ⋮ Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 ⋮ Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption ⋮ From Minicrypt to Obfustopia via Private-Key Functional Encryption ⋮ Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps ⋮ On Removing Graded Encodings from Functional Encryption ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Functional encryption for cascade automata ⋮ Indistinguishability Obfuscation: From Approximate to Exact ⋮ Multilinear Maps from Obfuscation ⋮ How to build time-lock encryption ⋮ Obfustopia built on secret-key functional encryption ⋮ Functional Encryption Without Obfuscation ⋮ Can PPAD hardness be based on standard cryptographic assumptions? ⋮ Constrained pseudorandom functions from functional encryption ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE ⋮ Combiners for functional encryption, unconditionally ⋮ Shorter Circuit Obfuscation in Challenging Security Models ⋮ Obfuscation Combiners ⋮ Cryptanalysis of GGH15 Multilinear Maps ⋮ Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 ⋮ Circular Security Separations for Arbitrary Length Cycles from LWE ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption ⋮ Cryptanalyses of Candidate Branching Program Obfuscators
Cites Work
- Probabilistic encryption
- Practical Multilinear Maps over the Integers
- On the distribution of reducible polynomials
- How random is the characteristic polynomial of a random matrix ?
- Candidate Multilinear Maps from Ideal Lattices
- Protecting Obfuscation against Algebraic Attacks
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
This page was built for publication: Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations