搜索结果: 1-5 共查到“GGH15”相关记录5条 . 查询时间(0.046 秒)
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Cryptanalysis indistinguishability obfuscation multilinear map
2018/11/12
We introduce a new type of cryptanalytic algorithm on the obfuscations based on the branching programs. Applying this algorithm to two recent general-purpose obfuscation schemes one by Chen et al. (CR...
The GGH15 multilinear maps have served as the foundation for a number of cutting-edge cryptographic proposals. Unfortunately, many schemes built on GGH15 have been explicitly broken by so-called ``zer...
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Graded encodings indistinguishability obfuscation
2018/4/19
We present new constructions of private constrained PRFs and lockable obfuscation, for constraints (resp. functions to be obfuscated) that are computable by general branching programs. Our constructio...
Recently, Coron presented an attack of GGH15 multilinear maps, which breaks the
multipartite Diffie-Hellman key exchange protocol based on GGH15. In this paper, we describe a
variation of GGH15, whi...
We describe a cryptanalysis of the GGH15 multilinear maps. Our attack breaks the multipartite
key-agreement protocol by generating an equivalent user private key.