Cryptanalysis of the multilinear map over the integers

JH Cheon, K Han, C Lee, H Ryu, D Stehlé - Advances in Cryptology …, 2015 - Springer
We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,
Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing …

New multilinear maps over the integers

JS Coron, T Lepoint, M Tibouchi - Annual Cryptology Conference, 2015 - Springer
In the last few years, cryptographic multilinear maps have proved their tremendous potential
as building blocks for new constructions, in particular the first viable approach to general …

Optimizing obfuscation: avoiding Barrington's theorem

P Ananth, D Gupta, Y Ishai, A Sahai - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation
schemes. We focus on the problem of optimizing the obfuscation of Boolean formulas and …

Algorithms for the approximate common divisor problem

SD Galbraith, SW Gebregiyorgis… - LMS Journal of …, 2016 - cambridge.org
The security of several homomorphic encryption schemes depends on the hardness of
variants of the approximate common divisor (ACD) problem. We survey and compare a …

Implementing cryptographic program obfuscation

D Apon, Y Huang, J Katz, AJ Malozemoff - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Program obfuscation is the process of making a program" unintelligible" without changing
the program's underlying input/output behavior. Although there is a long line of work on …

Bootstrapping fully homomorphic encryption over the integers in less than one second

HVL Pereira - Public-Key Cryptography–PKC 2021: 24th IACR …, 2021 - Springer
One can bootstrap LWE-based fully homomorphic encryption (FHE) schemes in less than
one second, but bootstrapping AGCD-based FHE schemes, also known as FHE over the …

5gen: A framework for prototyping applications using multilinear maps and matrix branching programs

K Lewi, AJ Malozemoff, D Apon, B Carmer… - Proceedings of the …, 2016 - dl.acm.org
Secure multilinear maps (mmaps) have been shown to have remarkable applications in
cryptography, such as multi-input functional encryption (MIFE) and program obfuscation. To …

Contention in cryptoland: obfuscation, leakage and UCE

M Bellare, I Stepanovs, S Tessaro - … Conference, TCC 2016-A, Tel Aviv …, 2016 - Springer
This paper addresses the fundamental question of whether or not different, exciting
primitives now being considered actually exist. We show that we, unfortunately, cannot have …

Indistinguishability obfuscation: from approximate to exact

N Bitansky, V Vaikuntanathan - Theory of Cryptography Conference, 2015 - Springer
We show general transformations from subexponentially-secure approximate
indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original …

Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic

HVL Pereira - International Conference on Applied Cryptography and …, 2020 - Springer
We propose a leveled homomorphic encryption scheme based on the Approximate Greatest
Common Divisor (AGCD) problem that operates natively on vectors and matrices. To …