Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
From MaRDI portal
Publication:6138084
DOI10.1007/978-3-031-30545-0_8zbMath1530.94033OpenAlexW4365934954MaRDI QIDQ6138084
Paul Lou, Huijia Lin, Amit Sahai, Aayush Jain
Publication date: 16 January 2024
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30545-0_8
Cites Work
- Unnamed Item
- Unnamed Item
- Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation)
- Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
- Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
- Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation
- Candidate iO from homomorphic encryption schemes
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- Candidate obfuscation via oblivious LWE sampling
- Counterexamples to new circular security assumptions underlying iO
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Sum-of-squares meets program obfuscation, revisited
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- Succinct LWE sampling, random polynomials, and obfuscation
- Indistinguishability Obfuscation with Non-trivial Efficiency
- Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
- Cryptanalysis of the New CLT Multilinear Map over the Integers
- Cryptanalysis of GGH Map
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Hardness of SIS and LWE with Small Parameters
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Practical Multilinear Maps over the Integers
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Cryptanalysis of the Multilinear Map over the Integers
- Verifiable Functional Encryption
- From Cryptomania to Obfustopia Through Secret-Key Functional Encryption
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- New Multilinear Maps Over the Integers
- Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation
- Indistinguishability Obfuscation from Compact Functional Encryption
- Secure Arithmetic Computation with No Honest Majority
- Indistinguishability Obfuscation from Functional Encryption
- Candidate Multilinear Maps from Ideal Lattices
- How to use indistinguishability obfuscation
- Obfuscation of Probabilistic Circuits and Applications
- Graph-Induced Multilinear Maps from Lattices
- Protecting Obfuscation against Algebraic Attacks
- Multi-input Functional Encryption
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Indistinguishability obfuscation from well-founded assumptions
- Indistinguishability obfuscation from circular security
This page was built for publication: Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)