Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978314
|View full text |Cite
|
Sign up to set email alerts
|

5Gen

Abstract: Secure multilinear maps (mmaps) have been shown to have remarkable applications in cryptography, such as multi-input functional encryption (MIFE) and program obfuscation. To date, there has been little evaluation of the performance of these applications. In this paper we initiate a systematic study of mmap-based constructions. We build a general framework, called 5Gen, to experiment with these applications. At the top layer we develop a compiler that takes in a high-level program and produces an optimized matr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(3 citation statements)
references
References 36 publications
(77 reference statements)
0
3
0
Order By: Relevance
“…From the theoretical perspective, scientists have already found an algorithm (i.e., graded encoding) which can obfuscate all programs with a compelling security property: indistinguishability (Garg et al 2013a;Zimmerman 2015;Lewi et al 2016). Since such results may confuse readers, next, we clarify the gaps between such theoretical research and real-world obfuscation problems with a sample graded encoding mechanism.…”
Section: Theoretical Obfuscation Researchmentioning
confidence: 92%
“…From the theoretical perspective, scientists have already found an algorithm (i.e., graded encoding) which can obfuscate all programs with a compelling security property: indistinguishability (Garg et al 2013a;Zimmerman 2015;Lewi et al 2016). Since such results may confuse readers, next, we clarify the gaps between such theoretical research and real-world obfuscation problems with a sample graded encoding mechanism.…”
Section: Theoretical Obfuscation Researchmentioning
confidence: 92%
“…Furthermore, known constructions of secretkey MiFE for bounded ciphertexts from standard assumptions [4,14] require non-black-box use of cryptographic primitives and are therefore unexplored with respect to implementability and efficiency. Constructions of secret-key MiFE from nonstandard multilinear maps [25] take 4 minutes running on a 32-core server for function evaluations on 4.7 GB ciphertexts, while only achieving security with respect to security parameter λ = 80. As a result, despite its immense potential, MiFE has so far had limited impact on the security world and does not give a practical solution to the proposed problem.…”
Section: An Impractical Theoretical Solutionmentioning
confidence: 99%
“…MiFE was first introduced in [19]. Constructing such schemes and variants has been a topic of much research in recent years [3,4,12,14,15,17,25]. [28] introduced a relaxation of functional encryption, called controlled functional encryption, in order to obtain an implementable variant of FE.…”
Section: Multi-input Functional Encryption and Practical Fementioning
confidence: 99%