Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Graph-Induced Multilinear Maps from Lattices - MaRDI portal

Graph-Induced Multilinear Maps from Lattices

From MaRDI portal
Publication:5261689

DOI10.1007/978-3-662-46497-7_20zbMath1315.94076OpenAlexW57039937MaRDI QIDQ5261689

Sergey Gorbunov, Shai Halevi, Craig Gentry

Publication date: 6 July 2015

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_20




Related Items (61)

Tensors in computations(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsObfuscating finite automataCutting-edge cryptography through the lens of secret sharingTraitor-tracing from LWE made simple and attribute-basedThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksConstructions for quantum indistinguishability obfuscationDelegating RAM Computations with Adaptive Soundness and PrivacySecure Obfuscation in a Weak Multilinear Map ModelCompactness vs Collusion Resistance in Functional EncryptionCryptanalysis of candidate obfuscators for affine determinant programsOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsCryptanalysis of multilinear maps from ideal lattices: revisitedProofs of Work from worst-case assumptionsNew approaches to traitor tracing with embedded identitiesAlgebraic generalization of Diffie-Hellman key exchangeMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsMultilinear maps from obfuscationMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsWitness encryption and null-iO from evasive LWEPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Another round of breaking and making quantum money: how to not build it from lattices, and moreLattice-based succinct arguments for NP with polylogarithmic-time verificationCandidate witness encryption from lattice techniquesCryptographic multilinear maps using pro-\(p\) groupsA survey on functional encryptionLockable obfuscation from circularly insecure fully homomorphic encryptionCollusion Resistant Traitor Tracing from Learning with ErrorsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPractical Order-Revealing Encryption with Limited LeakageEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationConstraining Pseudorandom Functions PrivatelyZeroizing Attacks on Indistinguishability Obfuscation over CLT13Robust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWECandidate iO from homomorphic encryption schemesWatermarking cryptographic functionalities from standard lattice assumptionsIndistinguishability Obfuscation: From Approximate to ExactMultilinear Maps from ObfuscationHow to build time-lock encryptionObfustopia built on secret-key functional encryptionConstrained pseudorandom functions from functional encryptionNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationCandidate iO from homomorphic encryption schemesDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Candidate obfuscation via oblivious LWE samplingChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionUniversal proxy re-encryptionCryptanalysis of GGH15 Multilinear MapsSimultaneous diagonalization of incomplete matrices and applicationsHomomorphic EncryptionSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program Obfuscators




This page was built for publication: Graph-Induced Multilinear Maps from Lattices