Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations - MaRDI portal

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations

From MaRDI portal
Publication:3457113

DOI10.1007/978-3-662-47989-6_12zbMath1375.94114OpenAlexW1462154385MaRDI QIDQ3457113

Mariana Raykova, Shai Halevi, Hemanta K. Maji, Craig Gentry, Amit Sahai, Tancrède Lepoint, Mehdi Tibouchi, Eric Miles, Jean-Sébastien Coron

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: http://orbilu.uni.lu/handle/10993/24863




Related Items (49)

One-Way Functions and (Im)perfect Obfuscation(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksStrong Hardness of Privacy from Weak Traitor TracingDelegating RAM Computations with Adaptive Soundness and PrivacySecure Obfuscation in a Weak Multilinear Map ModelCompactness vs Collusion Resistance in Functional EncryptionFrom minicrypt to obfustopia via private-key functional encryptionFrom FE combiners to secure MPC and backAttribute based encryption for deterministic finite automata from DLINMultilinear maps from obfuscationOn virtual grey box obfuscation for general circuits(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linCryptanalysis of the CLT13 multilinear mapPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Lattice-based succinct arguments for NP with polylogarithmic-time verificationLattice-based programmable hash functions and applicationsCollusion Resistant Traitor Tracing from Learning with ErrorsPractical Order-Revealing Encryption with Limited LeakageObfuscating conjunctionsEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsConstraining Pseudorandom Functions PrivatelyZeroizing Attacks on Indistinguishability Obfuscation over CLT13Robust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsFunctional encryption for cascade automataIndistinguishability Obfuscation: From Approximate to ExactMultilinear Maps from ObfuscationHow to build time-lock encryptionObfustopia built on secret-key functional encryptionFunctional Encryption Without ObfuscationCan PPAD hardness be based on standard cryptographic assumptions?Constrained pseudorandom functions from functional encryptionOptimal broadcast encryption from pairings and LWEIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FECombiners for functional encryption, unconditionallyShorter Circuit Obfuscation in Challenging Security ModelsObfuscation CombinersCryptanalysis of GGH15 Multilinear MapsAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Circular Security Separations for Arbitrary Length Cycles from LWEProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionCryptanalyses of Candidate Branching Program Obfuscators



Cites Work


This page was built for publication: Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations