Fast cryptographic primitives and circular-secure encryption based on hard learning problems

B Applebaum, D Cash, C Peikert, A Sahai - … , CA, USA, August 16-20, 2009 …, 2009 - Springer
The well-studied task of learning a linear function with errors is a seemingly hard problem
and the basis for several cryptographic schemes. Here we demonstrate additional …

Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs

H Lin - Annual International Cryptology Conference, 2017 - Springer
Two recent works [Lin, EUROCRYPT 2016, Lin and Vaikuntanathan, FOCS 2016] showed
how to construct Indistinguishability Obfuscation (IO) from constant degree multilinear maps …

Indistinguishability obfuscation from DDH-like assumptions on constant-degree graded encodings

H Lin, V Vaikuntanathan - 2016 IEEE 57th Annual Symposium …, 2016 - ieeexplore.ieee.org
All constructions of general purpose indistinguishability obfuscation (IO) rely on either meta-
assumptions that encapsulate an exponential family of assumptions (eg, Pass, Seth and …

Indistinguishability obfuscation from constant-degree graded encoding schemes

H Lin - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We construct an indistinguishability obfuscation (IO) scheme for all polynomial-size circuits
from constant-degree graded encoding schemes, assuming the existence of a …

Cryptography with constant computational overhead

Y Ishai, E Kushilevitz, R Ostrovsky… - Proceedings of the fortieth …, 2008 - dl.acm.org
Current constructions of cryptographic primitives typically involve a large multiplicative
computational overhead that grows with the desired level of security. We explore the …

Public-key cryptography from different assumptions

B Applebaum, B Barak, A Wigderson - Proceedings of the forty-second …, 2010 - dl.acm.org
This paper attempts to broaden the foundations of public-key cryptography. We construct
new public-key encryption schemes based on new hardness-on-average assumptions for …

Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN

Q Dao, Y Ishai, A Jain, H Lin - Annual International Cryptology Conference, 2023 - Springer
Over the past few years, homomorphic secret sharing (HSS) emerged as a compelling
alternative to fully homomorphic encryption (FHE), due to its feasibility from an array of …

Indistinguishability obfuscation from bilinear maps and LPN variants

S Ragavan, N Vafa, V Vaikuntanathan - Theory of Cryptography …, 2025 - Springer
We construct an indistinguishability obfuscation (IO) scheme from the sub-exponential
hardness of the decisional linear problem on bilinear groups together with two variants of …

Secure arithmetic computation with constant computational overhead

B Applebaum, I Damgård, Y Ishai, M Nielsen… - Annual International …, 2017 - Springer
We study the complexity of securely evaluating an arithmetic circuit over a finite field F in the
setting of secure two-party computation with semi-honest adversaries. In all existing …

Computational fuzzy extractors

B Fuller, X Meng, L Reyzin - Information and Computation, 2020 - Elsevier
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined
information-theoretically, with gaps between known negative results, existential …