Update (Oct 2015): The key-agreement protocols that are described (or alluded to) in sections 6,7 are broken. Thanks to Yupu Hu and Jean-Sébastien Coron for pointing out to me various attacks, these attacks (and their extensions) will be described in separate reports in the coming weeks/months. In this note we provide a more-or-less unified framework to talk about the functionality and security of graded encoding schemes, describe some variations of recent schemes, and discuss their security. In particular we describe schemes that combine elements from both the GGH13 scheme of Garg, Gentry and Halevi (EUROCRYPT 2013) and the GGH15 scheme of Gentry, Gorbunov and Halevi (TCC 2015). On one hand, we show how to use techniques from GGH13 in the...
Abstract. The GGH Graded Encoding Scheme [10], based on ideal lattices, is the first plausible ap-pr...
Recently, Hu and Jia presented an efficient attack on the GGH13 map. They show that the MPKE and WE ...
Graded multilinear encodings have found extensive applications in cryptography ranging from non-inte...
In this note we provide a more-or-less unified framework to talk about the functionality and securit...
We investigate the merits of altering the Garg, Gentry and Halevi (GGH13) graded encoding scheme to ...
© 2018, International Association for Cryptologic Research. We carry out a systematic study of the G...
In this short note, we analyze the security of the quadratic zero-testing procedure for the GGH13 gr...
In this short note, we analyze the security of the quadratic zero-testing procedure for the GGH13 gr...
We describe a cryptanalysis of the GGH15 multilinear maps. Our attack breaks in polynomial time the ...
The graded encoding scheme introduced by Gentry, Garg and Halevi (GGH scheme) is considered as an im...
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
Based on numerous experiments, the inventors of the Goldreich, Goldwasser and Halevi encryption sche...
Abstract. Multilinear map is a novel primitive which has many cryp-tographic applications, and GGH m...
Abstract. The GGH Graded Encoding Scheme [9], based on ideal lat-tices, is the first plausible appro...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Abstract. The GGH Graded Encoding Scheme [10], based on ideal lattices, is the first plausible ap-pr...
Recently, Hu and Jia presented an efficient attack on the GGH13 map. They show that the MPKE and WE ...
Graded multilinear encodings have found extensive applications in cryptography ranging from non-inte...
In this note we provide a more-or-less unified framework to talk about the functionality and securit...
We investigate the merits of altering the Garg, Gentry and Halevi (GGH13) graded encoding scheme to ...
© 2018, International Association for Cryptologic Research. We carry out a systematic study of the G...
In this short note, we analyze the security of the quadratic zero-testing procedure for the GGH13 gr...
In this short note, we analyze the security of the quadratic zero-testing procedure for the GGH13 gr...
We describe a cryptanalysis of the GGH15 multilinear maps. Our attack breaks in polynomial time the ...
The graded encoding scheme introduced by Gentry, Garg and Halevi (GGH scheme) is considered as an im...
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
Based on numerous experiments, the inventors of the Goldreich, Goldwasser and Halevi encryption sche...
Abstract. Multilinear map is a novel primitive which has many cryp-tographic applications, and GGH m...
Abstract. The GGH Graded Encoding Scheme [9], based on ideal lat-tices, is the first plausible appro...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Abstract. The GGH Graded Encoding Scheme [10], based on ideal lattices, is the first plausible ap-pr...
Recently, Hu and Jia presented an efficient attack on the GGH13 map. They show that the MPKE and WE ...
Graded multilinear encodings have found extensive applications in cryptography ranging from non-inte...