We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known results on the constructions of indistinguishability obfuscators from multilinear maps in the reverse direction. We provide two distinct, but closely related constructions and show that multilinear analogues of the DDH assumption hold for them. Our first construction is symmetric and comes with a ��-linear map ��:����⟶���� for prime-order groups �� and ����. To establish the hardness of the ��-linear DDH problem, we rely on the existence of a base group for which the ��-strong DDH assumption holds. Our second construction is for the asymmetric setting, where ��:��...
Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted signifi-cant g...
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, signifi...
In this paper, we develop a novel idea of multilinear cryptosystem using nilpotent group identities
We provide constructions of multilinear groups equipped with natural hard problems from in-distingui...
Multilinear maps enable homomorphic computation on encoded values and a public procedure to check if...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
Garg et al. [FOCS 2013] showed how to construct indistinguishability obfuscation (iO) from a restric...
The bilinear map whose domain and target sets are identical is called the self-bilinear map. Origina...
All known multilinear map candidates have suffered from a class of attacks known as ``zeroizing\u27\...
We propose a new way to obfuscate programs, using composite-order multilinear maps. Our construction...
Abstract. In the last few years, cryptographic multilinear maps have proved their tremendous potenti...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
In Kahrobaei et al. [Multilinear cryptography using nilpotent groups, Proceedings of Elementary Theo...
After more than a decade of usage, bilinear groups have established their place in the crypto-graphi...
In recent work Cheon, Han, Lee, Ryu, and Stehle ́ presented an attack on the multilinear map of Coro...
Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted signifi-cant g...
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, signifi...
In this paper, we develop a novel idea of multilinear cryptosystem using nilpotent group identities
We provide constructions of multilinear groups equipped with natural hard problems from in-distingui...
Multilinear maps enable homomorphic computation on encoded values and a public procedure to check if...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
Garg et al. [FOCS 2013] showed how to construct indistinguishability obfuscation (iO) from a restric...
The bilinear map whose domain and target sets are identical is called the self-bilinear map. Origina...
All known multilinear map candidates have suffered from a class of attacks known as ``zeroizing\u27\...
We propose a new way to obfuscate programs, using composite-order multilinear maps. Our construction...
Abstract. In the last few years, cryptographic multilinear maps have proved their tremendous potenti...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
In Kahrobaei et al. [Multilinear cryptography using nilpotent groups, Proceedings of Elementary Theo...
After more than a decade of usage, bilinear groups have established their place in the crypto-graphi...
In recent work Cheon, Han, Lee, Ryu, and Stehle ́ presented an attack on the multilinear map of Coro...
Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted signifi-cant g...
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, signifi...
In this paper, we develop a novel idea of multilinear cryptosystem using nilpotent group identities