(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
From MaRDI portal
Publication:831181
DOI10.1007/s10623-021-00854-yzbMath1469.94091OpenAlexW3136447405WikidataQ121603122 ScholiaQ121603122MaRDI QIDQ831181
Jiseung Kim, Wonhee Cho, Changmin Lee
Publication date: 10 May 2021
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00854-y
Cites Work
- Quantum attacks against indistinguishablility obfuscators proved secure in the weak multilinear map model
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Functional encryption for quadratic functions from \(k\)-lin, revisited
- Functional encryption for attribute-weighted sums from \(k\)-Lin
- From cryptomania to obfustopia through secret-key functional encryption
- From minicrypt to obfustopia via private-key functional encryption
- Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map
- Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously
- Functional Encryption Without Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of GGH Map
- Cryptanalysis of GGH15 Multilinear Maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Practical Multilinear Maps over the Integers
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
- Simple Functional Encryption Schemes for Inner Products
- Cryptanalysis of the Multilinear Map over the Integers
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- Indistinguishability Obfuscation from Compact Functional Encryption
- Trapdoors for hard lattices and new cryptographic constructions
- Indistinguishability Obfuscation from Functional Encryption
- Candidate Multilinear Maps from Ideal Lattices
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Graph-Induced Multilinear Maps from Lattices
- Cryptanalyses of Candidate Branching Program Obfuscators
- Fuzzy Identity-Based Encryption
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
This page was built for publication: (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps