Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
暂无分享,去创建一个
Jung Hee Cheon | Minki Hhan | Jiseung Kim | Changmin Lee | Wonhee Cho | J. Cheon | Changmin Lee | Jiseung Kim | Minki Hhan | Wonhee Cho
[1] Joe Zimmerman,et al. How to Obfuscate Programs Directly , 2015, EUROCRYPT.
[2] Huijia Lin,et al. Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs , 2017, CRYPTO.
[3] Brent Waters,et al. Lockable Obfuscation , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).
[4] Vinod Vaikuntanathan,et al. Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[5] Dan Boneh,et al. Key Homomorphic PRFs and Their Applications , 2013, CRYPTO.
[6] Eric Miles,et al. Secure Obfuscation in a Weak Multilinear Map Model , 2016, TCC.
[7] Mehdi Tibouchi,et al. Cryptanalysis of GGH15 Multilinear Maps , 2016, CRYPTO.
[8] Oded Goldreich,et al. The Foundations of Cryptography - Volume 1: Basic Techniques , 2001 .
[9] Mark Zhandry,et al. Return of GGH15: Provable Security Against Zeroizing Attacks , 2018, TCC.
[10] Jean-Sébastien Coron,et al. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 , 2017, Public Key Cryptography.
[11] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[12] Craig Gentry,et al. Graph-Induced Multilinear Maps from Lattices , 2015, TCC.
[13] Craig Gentry,et al. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations , 2015, CRYPTO.
[14] Craig Gentry,et al. Cryptanalyses of Candidate Branching Program Obfuscators , 2017, EUROCRYPT.
[15] Stefano Tessaro,et al. Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs , 2017, CRYPTO.
[16] Yuval Ishai,et al. Optimizing Obfuscation: Avoiding Barrington's Theorem , 2014, CCS.
[17] Mark Zhandry,et al. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation , 2014, Algorithmica.
[18] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[19] Jung Hee Cheon,et al. Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards , 2018, IEEE Access.
[20] Guy N. Rothblum,et al. Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding , 2014, TCC.
[21] Ran Canetti,et al. Constraint-Hiding Constrained PRFs for NC1 from LWE , 2017, EUROCRYPT.
[22] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[23] Vinod Vaikuntanathan,et al. Obfuscating Conjunctions under Entropic Ring LWE , 2016, ITCS.
[24] Jung Hee Cheon,et al. Cryptanalysis of the Multilinear Map over the Integers , 2014, EUROCRYPT.
[25] Eric Miles,et al. Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits , 2016, EUROCRYPT.
[26] Daniel Wichs,et al. Obfuscating Compute-and-Compare Programs under LWE , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).
[27] Vinod Vaikuntanathan,et al. GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates , 2018, IACR Cryptol. ePrint Arch..
[28] Mark Zhandry,et al. Preventing Zeroizing Attacks on GGH15 , 2018, IACR Cryptol. ePrint Arch..
[29] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[30] Yupu Hu,et al. Cryptanalysis of GGH Map , 2016, EUROCRYPT.
[31] Huijia Lin,et al. Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes , 2016, EUROCRYPT.
[32] Yael Tauman Kalai,et al. Protecting Obfuscation against Algebraic Attacks , 2014, EUROCRYPT.
[33] Alice Pellet-Mary,et al. Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model , 2018, IACR Cryptol. ePrint Arch..
[34] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[35] Jung Hee Cheon,et al. Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem , 2018, CRYPTO.
[36] Mark Zhandry,et al. The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks , 2018, TCC.
[37] Shai Halevi,et al. Implementing BP-Obfuscation Using Graph-Induced Encoding , 2017, CCS.
[38] Rafael Pass,et al. Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings , 2014, CRYPTO.
[39] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[40] Jean-Sébastien Coron,et al. Practical Multilinear Maps over the Integers , 2013, CRYPTO.
[41] Eric Miles,et al. Protecting obfuscation against arithmetic attacks , 2014, IACR Cryptol. ePrint Arch..