2018
DOI: 10.1007/978-3-030-05378-9_18
|View full text |Cite
|
Sign up to set email alerts
|

Obfuscation from Low Noise Multilinear Maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(26 citation statements)
references
References 43 publications
0
26
0
Order By: Relevance
“…Our work builds on the vast amount of previous work showing applications of mmaps-most notably, MIFE [30,10] and obfuscation [15,7,38,3,40,5,29,6,34,35,27,37,22].…”
Section: Related Workmentioning
confidence: 99%
“…Our work builds on the vast amount of previous work showing applications of mmaps-most notably, MIFE [30,10] and obfuscation [15,7,38,3,40,5,29,6,34,35,27,37,22].…”
Section: Related Workmentioning
confidence: 99%
“…Some iO constructions come with a security proof based on assumptions in the standard model [2,29,30], but cannot be securely instantiated with the GGH13 MMap as they require low-level encodings of 0. Others are proved secure in a non-standard model (the Generic MMap model [4,9] or the Weak MMap Model [15,18]). These models remain not fully satisfactory, as they imply Virtual-Black-Box Obfuscation [9,18], a provably impossible primitive [5].…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, no formal statement was made on what this countermeasure prevents: the countermeasure is heuristic. This particular countermeasure turned out to be a difficulty when considering variants of the original scheme, as done in [15]. This candidate obfuscator aims at reaching polynomially small errors and modulus (in order to improve both efficiency and security of the GGH map, especially in the light of the dense sublattice attacks [1,12,26]) and hence cannot use the original sampling methods from [17].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations