2019
DOI: 10.1007/978-3-030-26954-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 46 publications
(12 citation statements)
references
References 77 publications
0
12
0
Order By: Relevance
“…In prior works [AJS18,JLMS19], the authors define a so-called partially-hiding FE allowing for the computation on two inputs (x, y), where the input x is seen as a public attribute and the other one, y, remains hidden. The construction of [AJKS18] supports degree-2 computation on the private input y, and degree-1 computation on the public input x. Its security rely on the generic bilinear group model.…”
Section: Multi-input Extensionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In prior works [AJS18,JLMS19], the authors define a so-called partially-hiding FE allowing for the computation on two inputs (x, y), where the input x is seen as a public attribute and the other one, y, remains hidden. The construction of [AJKS18] supports degree-2 computation on the private input y, and degree-1 computation on the public input x. Its security rely on the generic bilinear group model.…”
Section: Multi-input Extensionsmentioning
confidence: 99%
“…Its security rely on the generic bilinear group model. In [JLMS19], functional secret keys support the computation of degree-2 polynomials on the private input, as in [AJKS18], but it supports NC 0 computation on the public input. As an additional benefit, the security of their construction rely on a standard assumption on pairing groups (namely, SXDH).…”
Section: Multi-input Extensionsmentioning
confidence: 99%
“…• A recent series of works demonstrated a close connection between building functional encryption (and thus IO) to that of low-degree pseudorandom generators (PRG) over the integers [35,5,2], where the role of the PRGs is to flood any leakage from the error term during FHE decryption [30]. Here, we show to exploit matrix PRFs -again over the integersto flood any leakage from the error term in the GGH15 encodings (but unlike the setting of PRGs, we do not require the output of the PRFs to have polynomially bounded domain).…”
Section: Discussionmentioning
confidence: 99%
“…where + is computed over Z. A similar relaxation has been considered in the context of weaker pseudorandom generators for building IO [5]. For this notion, one could potentially have candidates where each M i,b is drawn uniformly at random from a Gaussian distribution but where v M R is the same as in Section 6.1.2.…”
Section: Securitymentioning
confidence: 99%
See 1 more Smart Citation