Obfuscating Circuits via Composite-Order Graded Encoding, Dodis and Nielsen [DN15], pp.528-556 ,
DOI : 10.1007/978-3-662-46497-7_21
Short Group Signatures, LNCS, vol.3152, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Circular-Secure Encryption from Decision Diffie-Hellman, LNCS, vol.5157, pp.108-125, 2008. ,
DOI : 10.1007/978-3-540-85174-5_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.4099
Key Homomorphic PRFs and Their Applications, Canetti and Garay [CG13a], pp.410-428 ,
DOI : 10.1007/978-3-642-40041-4_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.477.2961
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation, Oswald and Fischlin [OF15], pp.563-594 ,
DOI : 10.1007/978-3-662-46803-6_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.690.2359
Applications of multilinear forms to cryptography, Contemporary Mathematics, vol.324, pp.71-90, 2003. ,
DOI : 10.1090/conm/324/05731
Low Overhead Broadcast Encryption from Multilinear Maps, CRYPTO 2014, pp.206-223, 2014. ,
DOI : 10.1007/978-3-662-44371-2_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.6438
Zeroizing without low-level zeroes: New MMAP attacks and their limitations, Cryptology ePrint Archive, vol.15596596, 2015. ,
Cryptanalysis of the multilinear map over the integers, EUROCRYPT 2015, pp.3-12, 2015. ,
Cryptanalysis of the new CLT multilinear maps. Cryptology ePrint Archive, 2015. ,
Practical multilinear maps over the integers, Canetti and Garay [CG13a], pp.476-493 ,
New multilinear maps over the integers, Gennaro and Robshaw [GR15], pp.267-286 ,
Obfuscation of Probabilistic Circuits and Applications, Dodis and Nielsen [DN15], pp.468-497 ,
DOI : 10.1007/978-3-662-46497-7_19
Cryptanalysis of GGH15 multilinear maps. Cryptology ePrint Archive, 2015. ,
An algebraic framework for Diffie-Hellman assumptions, Canetti and Garay [CG13b], pp.129-147 ,
Programmable hash functions in the multilinear setting, Canetti and Garay [CG13a], pp.513-530 ,
Candidate Multilinear Maps from Ideal Lattices, EUROCRYPT 2013, pp.1-17, 2013. ,
DOI : 10.1007/978-3-642-38348-9_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6312
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp.40-49, 2013. ,
DOI : 10.1109/FOCS.2013.13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6501
Attributebased encryption for circuits from multilinear maps, Canetti and Garay [CG13b], pp.479-499 ,
Graph-Induced Multilinear Maps from Lattices, Dodis and Nielsen [DN15], pp.498-527 ,
DOI : 10.1007/978-3-662-46497-7_20
Using fully homomorphic hybrid encryption to minimize non-interative zeroknowledge proofs, Journal of Cryptology, pp.1-24, 2014. ,
DOI : 10.1007/s00145-014-9184-y
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.9628
Witness encryption and its applications, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.467-476, 2013. ,
DOI : 10.1145/2488608.2488667
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.860
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience, ESORICS 2012, pp.627-642, 2012. ,
DOI : 10.1007/978-3-642-33167-1_36
Efficient Non-interactive Proof Systems for Bilinear Groups, LNCS, vol.4965, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Cryptanalysis of GGH map Cryptology ePrint Archive, 2015. ,
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures, Canetti and Garay [CG13a], pp.494-512 ,
DOI : 10.1007/978-3-642-40041-4_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6165
Cryptanalysis of the new multilinear map over the integers, Cryptology ePrint Archive, 2015. ,
Public-key cryptosystems resilient to key leakage, LNCS, vol.5677, pp.18-35, 2009. ,
DOI : 10.1007/978-3-642-03356-8_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.9956
Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing , STOC '90, pp.427-437, 1990. ,
DOI : 10.1145/100216.100273
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5883
Optimal Authenticated Data Structures with Multilinear Forms, PAIRING 2010, pp.246-264 ,
DOI : 10.1007/978-3-642-17455-1_16
Attribute-Based Signatures for Circuits from Multilinear Maps, ISC 2014, pp.54-71, 2014. ,
DOI : 10.1007/978-3-319-13257-0_4
Selfbilinear map on unknown order groups from indistinguishability obfuscation and its applications, CRYPTO 2014, Part II, pp.90-107, 2014. ,
DOI : 10.1007/978-3-662-44381-1_6