Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
From MaRDI portal
Publication:5738782
DOI10.1007/978-3-662-54365-8_3zbMath1404.94056OpenAlexW2592033350MaRDI QIDQ5738782
Jean-Sébastien Coron, Moon Sung Lee, Mehdi Tibouchi, Tancrède Lepoint
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://eprint.iacr.org/2016/1011.pdf
Related Items (17)
One-Way Functions and (Im)perfect Obfuscation ⋮ (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps ⋮ The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks ⋮ Matrix PRFs: constructions, attacks, and applications to obfuscation ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Cryptanalysis of the CLT13 multilinear map ⋮ Witness encryption and null-iO from evasive LWE ⋮ Lattice-based succinct arguments for NP with polylogarithmic-time verification ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 ⋮ Obfustopia built on secret-key functional encryption ⋮ Constrained pseudorandom functions from functional encryption ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE ⋮ Candidate obfuscation via oblivious LWE sampling ⋮ Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation ⋮ Cryptanalyses of Candidate Branching Program Obfuscators
Uses Software
Cites Work
- Unnamed Item
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of GGH Map
- Cryptanalysis of GGH15 Multilinear Maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Practical Multilinear Maps over the Integers
- Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
- Cryptanalysis of the Multilinear Map over the Integers
- How to Obfuscate Programs Directly
- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
- Secure Obfuscation in a Weak Multilinear Map Model
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- Candidate Multilinear Maps from Ideal Lattices
- Graph-Induced Multilinear Maps from Lattices
- Obfuscating Circuits via Composite-Order Graded Encoding
- Cryptanalyses of Candidate Branching Program Obfuscators
- Protecting Obfuscation against Algebraic Attacks
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
This page was built for publication: Zeroizing Attacks on Indistinguishability Obfuscation over CLT13