Cryptanalysis of the multilinear map over the integers
We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,
Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing …
Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing …
New multilinear maps over the integers
In the last few years, cryptographic multilinear maps have proved their tremendous potential
as building blocks for new constructions, in particular the first viable approach to general …
as building blocks for new constructions, in particular the first viable approach to general …
Optimizing obfuscation: avoiding Barrington's theorem
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation
schemes. We focus on the problem of optimizing the obfuscation of Boolean formulas and …
schemes. We focus on the problem of optimizing the obfuscation of Boolean formulas and …
Algorithms for the approximate common divisor problem
SD Galbraith, SW Gebregiyorgis… - LMS Journal of …, 2016 - cambridge.org
The security of several homomorphic encryption schemes depends on the hardness of
variants of the approximate common divisor (ACD) problem. We survey and compare a …
variants of the approximate common divisor (ACD) problem. We survey and compare a …
Implementing cryptographic program obfuscation
Program obfuscation is the process of making a program" unintelligible" without changing
the program's underlying input/output behavior. Although there is a long line of work on …
the program's underlying input/output behavior. Although there is a long line of work on …
Bootstrapping fully homomorphic encryption over the integers in less than one second
HVL Pereira - Public-Key Cryptography–PKC 2021: 24th IACR …, 2021 - Springer
One can bootstrap LWE-based fully homomorphic encryption (FHE) schemes in less than
one second, but bootstrapping AGCD-based FHE schemes, also known as FHE over the …
one second, but bootstrapping AGCD-based FHE schemes, also known as FHE over the …
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs
Secure multilinear maps (mmaps) have been shown to have remarkable applications in
cryptography, such as multi-input functional encryption (MIFE) and program obfuscation. To …
cryptography, such as multi-input functional encryption (MIFE) and program obfuscation. To …
Contention in cryptoland: obfuscation, leakage and UCE
This paper addresses the fundamental question of whether or not different, exciting
primitives now being considered actually exist. We show that we, unfortunately, cannot have …
primitives now being considered actually exist. We show that we, unfortunately, cannot have …
Indistinguishability obfuscation: from approximate to exact
N Bitansky, V Vaikuntanathan - Theory of Cryptography Conference, 2015 - Springer
We show general transformations from subexponentially-secure approximate
indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original …
indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original …
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
HVL Pereira - International Conference on Applied Cryptography and …, 2020 - Springer
We propose a leveled homomorphic encryption scheme based on the Approximate Greatest
Common Divisor (AGCD) problem that operates natively on vectors and matrices. To …
Common Divisor (AGCD) problem that operates natively on vectors and matrices. To …