Candidate obfuscation via oblivious LWE sampling

H Wee, D Wichs - Annual International Conference on the Theory and …, 2021 - Springer
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …

Witness encryption and null-IO from evasive LWE

V Vaikuntanathan, H Wee, D Wichs - … on the Theory and Application of …, 2022 - Springer
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …

Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs

H Lin - Annual International Cryptology Conference, 2017 - Springer
Two recent works [Lin, EUROCRYPT 2016, Lin and Vaikuntanathan, FOCS 2016] showed
how to construct Indistinguishability Obfuscation (IO) from constant degree multilinear maps …

Indistinguishability obfuscation from trilinear maps and block-wise local PRGs

H Lin, S Tessaro - Annual International Cryptology Conference, 2017 - Springer
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …

Optimal broadcast encryption from pairings and LWE

S Agrawal, S Yamada - Advances in Cryptology–EUROCRYPT 2020: 39th …, 2020 - Springer
Abstract Boneh, Waters and Zhandry (CRYPTO 2014) used multilinear maps to provide a
solution to the long-standing problem of public-key broadcast encryption (BE) where all …

Lockable obfuscation

R Goyal, V Koppula, B Waters - 2017 IEEE 58th Annual …, 2017 - ieeexplore.ieee.org
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation
scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a …

GGH15 beyond permutation branching programs: proofs, attacks, and candidates

Y Chen, V Vaikuntanathan, H Wee - … , Santa Barbara, CA, USA, August 19 …, 2018 - Springer
We carry out a systematic study of the GGH15 graded encoding scheme used with general
branching programs. This is motivated by the fact that general branching programs are more …

Collusion resistant traitor tracing from learning with errors

R Goyal, V Koppula, B Waters - Proceedings of the 50th annual ACM …, 2018 - dl.acm.org
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially
in log (n) where n is the number of users and prove it secure under the Learning with Errors …

Indistinguishability obfuscation without maps: Attacks and fixes for noisy linear FE

S Agrawal, A Pellet-Mary - Annual International Conference on the Theory …, 2020 - Springer
Abstract Candidates of Indistinguishability Obfuscation (iO) can be categorized as “direct” or
“bootstrap** based”. Direct constructions rely on high degree multilinear maps 28, 29 and …

Cryptanalyses of candidate branching program obfuscators

Y Chen, C Gentry, S Halevi - … 36th Annual International Conference on the …, 2017 - Springer
We describe new cryptanalytic attacks on the candidate branching program obfuscator
proposed by Garg, Gentry, Halevi, Raykova, Sahai and Waters (GGHRSW) using the …