Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted signifi-cant gaps in our intuition about security in candidate multilinear map schemes, and in candidate obfuscators that use them. The new attacks, and some that were previously known, are typically called “zeroizing ” attacks because they all crucially rely on the ability of the adversary to create encodings of 0. In this work, we initiate the study of post-zeroizing obfuscation, and we present a construction for the special case of evasive functions. We show that our obfuscator survives all known attacks on the underlying multilinear maps, by proving that no encodings of 0 can be created by a generic-model adversary. Previous obfuscators (for both evasi...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
Abstract. We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
All known multilinear map candidates have suffered from a class of attacks known as ``zeroizing\u27\...
Multilinear maps enable homomorphic computation on encoded values and a public procedure to check if...
In recent work Cheon, Han, Lee, Ryu, and Stehle ́ presented an attack on the multilinear map of Coro...
Obfuscation, the task of compiling circuits or programs to make the internal computation un-intellig...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
We propose a new way to obfuscate programs, using composite-order multilinear maps. Our construction...
We extend the recent zeroizing attacks of Cheon, Han, Lee, Ryu and Stehle ́ (Eurocrypt’15) on multil...
We present a candidate obfuscator based on composite-order Graded Encoding Schemes (GES), which are ...
We extend the recent zeroizing attacks of Cheon, Han, Lee, Ryu and Stehlé (Eurocrypt\u2715) on multi...
Abstract. Multilinear maps have many cryptographic applications. The first candidate construction of...
Cryptographic multilinear map is a useful tool for constructing numerous secure protocols and Graded...
International audienceDue to the vast number of successful related-key attacks against existing bloc...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
Abstract. We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
All known multilinear map candidates have suffered from a class of attacks known as ``zeroizing\u27\...
Multilinear maps enable homomorphic computation on encoded values and a public procedure to check if...
In recent work Cheon, Han, Lee, Ryu, and Stehle ́ presented an attack on the multilinear map of Coro...
Obfuscation, the task of compiling circuits or programs to make the internal computation un-intellig...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
We propose a new way to obfuscate programs, using composite-order multilinear maps. Our construction...
We extend the recent zeroizing attacks of Cheon, Han, Lee, Ryu and Stehle ́ (Eurocrypt’15) on multil...
We present a candidate obfuscator based on composite-order Graded Encoding Schemes (GES), which are ...
We extend the recent zeroizing attacks of Cheon, Han, Lee, Ryu and Stehlé (Eurocrypt\u2715) on multi...
Abstract. Multilinear maps have many cryptographic applications. The first candidate construction of...
Cryptographic multilinear map is a useful tool for constructing numerous secure protocols and Graded...
International audienceDue to the vast number of successful related-key attacks against existing bloc...
Previously known functional encryption (FE) schemes for general circuits relied on indistin-guishabi...
Abstract. We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...