A. Martin, R. Albrecht, P. Farshim, D. Hofheinz, E. Larraia et al., Paterson. Multilinear maps from obfuscation, TCC 2016A, Part I, vol.9562, pp.446-473, 2016.

H. Abusalah, G. Fuchsbauer, and K. Pietrzak, Constrained PRFs for unbounded inputs, LNCS, vol.9610, pp.413-428, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01384375

P. Ananth and A. Sahai, Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps, Lecture Notes in Computer Science, vol.10210, pp.152-181, 2017.

D. Boneh and X. Boyen, Short signatures without random oracles, LNCS, vol.3027, pp.56-73, 2004.
DOI : 10.1007/978-3-540-24676-3_4

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-24676-3_4.pdf

D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry et al., Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation, Oswald and Fischlin, pp.563-594
DOI : 10.1007/978-3-662-46803-6_19

URL : http://eprint.iacr.org/2014/834.pdf

D. Boneh and A. Silverberg, Applications of multilinear forms to cryptography, Contemporary Mathematics, vol.324, pp.71-90, 2003.

D. Boneh and B. Waters, Constrained pseudorandom functions and their applications, ASIACRYPT 2013, Part II, vol.8270, pp.280-300, 2013.
DOI : 10.1007/978-3-642-42045-0_15

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-42045-0_15.pdf

D. Boneh, B. Waters, and M. Zhandry, Low overhead broadcast encryption from multilinear maps, Garay and Gennaro [GG14], pp.206-223
DOI : 10.1007/978-3-662-44371-2_12

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-662-44371-2_12.pdf

R. Canetti and J. A. Garay, CRYPTO 2013, Part I, vol.8042, 2013.

R. Canetti and J. A. Garay, CRYPTO 2013, Part II, vol.8043, 2013.

J. Coron, C. Gentry, S. Halevi, T. Lepoint, K. Hemanta et al., Zeroizing without low-level zeroes: New MMAP attacks and their limitations, Gennaro and Robshaw [GR15, pp.247-266
DOI : 10.1007/978-3-662-47989-6_12

URL : http://orbilu.uni.lu/bitstream/10993/24863/1/596.pdf

J. Hee-cheon, K. Han, C. Lee, H. Ryu, and D. Stehlé, Cryptanalysis of the multilinear map over the integers, EUROCRYPT 2015, Part I, vol.9056, pp.3-12, 2015.

J. Coron, M. S. Lee, T. Lepoint, and M. Tibouchi, Cryptanalysis of GGH15 multilinear maps, Robshaw and Katz [RK16], pp.607-628

T. Jean-sébastien-coron, M. Lepoint, and . Tibouchi, Practical multilinear maps over the integers, Canetti and Garay [CG13a, pp.476-493

T. Jean-sébastien-coron, M. Lepoint, and . Tibouchi, New multilinear maps over the integers, Gennaro and Robshaw [GR15], pp.267-286

R. Canetti, H. Lin, S. Tessaro, and V. Vaikuntanathan, Obfuscation of probabilistic circuits and applications, Dodis and Nielsen [DN15], pp.468-497

, TCC 2015, Part II, vol.9015, 2015.

A. Escala, G. Herold, E. Kiltz, C. , and J. Villar, An algebraic framework for Diffie-Hellman assumptions, Canetti and Garay [CG13b, pp.129-147
DOI : 10.1007/978-3-642-40084-1_8

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-40084-1_8.pdf

S. V. Eduarda, D. Freire, K. G. Hofheinz, C. Paterson, and . Striecks, Programmable hash functions in the multilinear setting, Canetti and Garay [CG13a, pp.513-530

J. A. Garay and R. Gennaro, CRYPTO 2014, Part I, vol.8616, 2014.

S. Garg, C. Gentry, and S. Halevi, Candidate multilinear maps from ideal lattices, LNCS, vol.7881, pp.1-17, 2013.
DOI : 10.1007/978-3-642-38348-9_1

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-38348-9_1.pdf

[. Ggh-+-13b]-sanjam, C. Garg, S. Gentry, M. Halevi, A. Raykova et al., Candidate indistinguishability obfuscation and functional encryption for all circuits, 54th FOCS, pp.40-49, 2013.

[. Ggh-+-13c]-sanjam, C. Garg, S. Gentry, A. Halevi, B. Sahai et al., Attribute-based encryption for circuits from multilinear maps, Canetti and Garay [CG13b, pp.479-499

C. Gentry, S. Gorbunov, and S. Halevi, Graph-induced multilinear maps from lattices, Dodis and Nielsen [DN15], pp.498-527
DOI : 10.1007/978-3-662-46497-7_20

S. Garg, C. Gentry, A. Sahai, and B. Waters, Witness encryption and its applications, 45th ACM STOC, pp.467-476, 2013.
DOI : 10.1145/2488608.2488667

URL : http://eprint.iacr.org/2013/258.pdf

S. Garg, P. Mukherjee, and A. Srinivasan, Obfuscation without the vulnerabilities of multilinear maps, Cryptology ePrint Archive, 2016.
DOI : 10.1007/978-3-319-10879-7_6

S. Goldwasser and G. N. Rothblum, On best-possible obfuscation, LNCS, vol.4392, pp.194-213, 2007.
DOI : 10.1007/978-3-540-70936-7_11

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-70936-7_11.pdf

R. Gennaro, J. B. Matthew, and . Robshaw, CRYPTO 2015, Part I, vol.9215, 2015.

J. Groth and A. Sahai, Efficient non-interactive proof systems for bilinear groups, LNCS, vol.4965, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

URL : http://www.brics.dk/~jg/WImoduleFull.pdf

J. Groth and A. Sahai, Efficient noninteractive proof systems for bilinear groups, SIAM J. Comput, vol.41, issue.5, pp.1193-1232, 2012.
DOI : 10.1137/080725386

URL : http://www.brics.dk/~jg/WImoduleFull.pdf

D. Hofheinz and E. Kiltz, Programmable hash functions and their applications, LNCS, vol.5157, pp.21-38, 2008.
DOI : 10.1007/s00145-011-9102-5

URL : https://ir.cwi.nl/pub/19471/19471B.pdf

S. Hohenberger, A. Sahai, and B. Waters, Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures, Canetti and Garay [CG13a, pp.494-512
DOI : 10.1007/978-3-642-40041-4_27

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-40041-4_27.pdf

H. Lin, Indistinguishability obfuscation from DDH on 5-linear maps and locality-5 prgs, Cryptology ePrint Archive, 1096.
DOI : 10.1007/978-3-319-63688-7_20

A. Langlois, D. Stehlé, and R. Steinfeld, GGHLite: More efficient multilinear maps from ideal lattices, LNCS, vol.8441, pp.239-256, 2014.
DOI : 10.1007/978-3-642-55220-5_14

URL : https://hal.archives-ouvertes.fr/hal-00983179

H. Lin and S. Tessaro, Indistinguishability obfuscation from bilinear maps and blockwise local prgs. Cryptology ePrint Archive, 2017.
DOI : 10.1007/978-3-319-63688-7_21

E. Miles, A. Sahai, and M. Zhandry, Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over GGH13, Robshaw and Katz [RK16], pp.629-658
DOI : 10.1007/978-3-662-53008-5_22

, EUROCRYPT 2015, Part II, vol.9057, 2015.

O. Paneth and A. Sahai, On the equivalence of obfuscation and multilinear maps. Cryptology ePrint Archive, 2015.

R. Pass, K. Seth, and S. Telang, Indistinguishability obfuscation from semantically-secure multilinear encodings, Garay and Gennaro [GG14], pp.500-517

M. Robshaw and J. Katz, CRYPTO 2016, Part II, vol.9815, 2016.

A. Sahai and B. Waters, How to use indistinguishability obfuscation: deniable encryption, and more, 46th ACM STOC, pp.475-484, 2014.

F. Zhang, R. Safavi-naini, and W. Susilo, An efficient signature scheme from bilinear pairings and its applications, LNCS, vol.2947, pp.277-290, 2004.

, A Details of the AFHLP Symmetric Multilinear Map

, construct a symmetric ?-linear group scheme ? relying on the following building blocks: 1. An algorithm Setup G that samples (a description of) a group G, AFHLP

A. Probabilistic-indistinguishability-obfuscator-obf,

, An additively homomorphic public-key encryption scheme ? with plaintext space Z p (or alternatively, a perfectly correct FHE scheme)

, An extractable dual-mode NIZK proof system ?

, A language family ? with hard membership problem and unique witnesses. We recall their construction in the section that follow