Paterson. Multilinear maps from obfuscation, TCC 2016A, Part I, vol.9562, pp.446-473, 2016. ,
Constrained PRFs for unbounded inputs, LNCS, vol.9610, pp.413-428, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01384375
Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps, Lecture Notes in Computer Science, vol.10210, pp.152-181, 2017. ,
Short signatures without random oracles, LNCS, vol.3027, pp.56-73, 2004. ,
DOI : 10.1007/978-3-540-24676-3_4
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-24676-3_4.pdf
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation, Oswald and Fischlin, pp.563-594 ,
DOI : 10.1007/978-3-662-46803-6_19
URL : http://eprint.iacr.org/2014/834.pdf
Applications of multilinear forms to cryptography, Contemporary Mathematics, vol.324, pp.71-90, 2003. ,
Constrained pseudorandom functions and their applications, ASIACRYPT 2013, Part II, vol.8270, pp.280-300, 2013. ,
DOI : 10.1007/978-3-642-42045-0_15
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-42045-0_15.pdf
Low overhead broadcast encryption from multilinear maps, Garay and Gennaro [GG14], pp.206-223 ,
DOI : 10.1007/978-3-662-44371-2_12
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-662-44371-2_12.pdf
, CRYPTO 2013, Part I, vol.8042, 2013.
, CRYPTO 2013, Part II, vol.8043, 2013.
Zeroizing without low-level zeroes: New MMAP attacks and their limitations, Gennaro and Robshaw [GR15, pp.247-266 ,
DOI : 10.1007/978-3-662-47989-6_12
URL : http://orbilu.uni.lu/bitstream/10993/24863/1/596.pdf
Cryptanalysis of the multilinear map over the integers, EUROCRYPT 2015, Part I, vol.9056, pp.3-12, 2015. ,
Cryptanalysis of GGH15 multilinear maps, Robshaw and Katz [RK16], pp.607-628 ,
Practical multilinear maps over the integers, Canetti and Garay [CG13a, pp.476-493 ,
New multilinear maps over the integers, Gennaro and Robshaw [GR15], pp.267-286 ,
Obfuscation of probabilistic circuits and applications, Dodis and Nielsen [DN15], pp.468-497 ,
, TCC 2015, Part II, vol.9015, 2015.
An algebraic framework for Diffie-Hellman assumptions, Canetti and Garay [CG13b, pp.129-147 ,
DOI : 10.1007/978-3-642-40084-1_8
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-40084-1_8.pdf
Programmable hash functions in the multilinear setting, Canetti and Garay [CG13a, pp.513-530 ,
, CRYPTO 2014, Part I, vol.8616, 2014.
Candidate multilinear maps from ideal lattices, LNCS, vol.7881, pp.1-17, 2013. ,
DOI : 10.1007/978-3-642-38348-9_1
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-38348-9_1.pdf
Candidate indistinguishability obfuscation and functional encryption for all circuits, 54th FOCS, pp.40-49, 2013. ,
Attribute-based encryption for circuits from multilinear maps, Canetti and Garay [CG13b, pp.479-499 ,
Graph-induced multilinear maps from lattices, Dodis and Nielsen [DN15], pp.498-527 ,
DOI : 10.1007/978-3-662-46497-7_20
Witness encryption and its applications, 45th ACM STOC, pp.467-476, 2013. ,
DOI : 10.1145/2488608.2488667
URL : http://eprint.iacr.org/2013/258.pdf
Obfuscation without the vulnerabilities of multilinear maps, Cryptology ePrint Archive, 2016. ,
DOI : 10.1007/978-3-319-10879-7_6
On best-possible obfuscation, LNCS, vol.4392, pp.194-213, 2007. ,
DOI : 10.1007/978-3-540-70936-7_11
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-70936-7_11.pdf
, CRYPTO 2015, Part I, vol.9215, 2015.
Efficient non-interactive proof systems for bilinear groups, LNCS, vol.4965, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
URL : http://www.brics.dk/~jg/WImoduleFull.pdf
Efficient noninteractive proof systems for bilinear groups, SIAM J. Comput, vol.41, issue.5, pp.1193-1232, 2012. ,
DOI : 10.1137/080725386
URL : http://www.brics.dk/~jg/WImoduleFull.pdf
Programmable hash functions and their applications, LNCS, vol.5157, pp.21-38, 2008. ,
DOI : 10.1007/s00145-011-9102-5
URL : https://ir.cwi.nl/pub/19471/19471B.pdf
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures, Canetti and Garay [CG13a, pp.494-512 ,
DOI : 10.1007/978-3-642-40041-4_27
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-40041-4_27.pdf
Indistinguishability obfuscation from DDH on 5-linear maps and locality-5 prgs, Cryptology ePrint Archive, 1096. ,
DOI : 10.1007/978-3-319-63688-7_20
GGHLite: More efficient multilinear maps from ideal lattices, LNCS, vol.8441, pp.239-256, 2014. ,
DOI : 10.1007/978-3-642-55220-5_14
URL : https://hal.archives-ouvertes.fr/hal-00983179
Indistinguishability obfuscation from bilinear maps and blockwise local prgs. Cryptology ePrint Archive, 2017. ,
DOI : 10.1007/978-3-319-63688-7_21
Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over GGH13, Robshaw and Katz [RK16], pp.629-658 ,
DOI : 10.1007/978-3-662-53008-5_22
, EUROCRYPT 2015, Part II, vol.9057, 2015.
On the equivalence of obfuscation and multilinear maps. Cryptology ePrint Archive, 2015. ,
Indistinguishability obfuscation from semantically-secure multilinear encodings, Garay and Gennaro [GG14], pp.500-517 ,
, CRYPTO 2016, Part II, vol.9815, 2016.
How to use indistinguishability obfuscation: deniable encryption, and more, 46th ACM STOC, pp.475-484, 2014. ,
An efficient signature scheme from bilinear pairings and its applications, LNCS, vol.2947, pp.277-290, 2004. ,
, A Details of the AFHLP Symmetric Multilinear Map
, construct a symmetric ?-linear group scheme ? relying on the following building blocks: 1. An algorithm Setup G that samples (a description of) a group G, AFHLP
,
, An additively homomorphic public-key encryption scheme ? with plaintext space Z p (or alternatively, a perfectly correct FHE scheme)
, An extractable dual-mode NIZK proof system ?
, A language family ? with hard membership problem and unique witnesses. We recall their construction in the section that follow