Candidate obfuscation via oblivious LWE sampling

H Wee, D Wichs - Annual International Conference on the Theory and …, 2021 - Springer
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …

Hidden cosets and applications to unclonable cryptography

A Coladangelo, J Liu, Q Liu, M Zhandry - … 16–20, 2021, Proceedings, Part I …, 2021 - Springer
Abstract In 2012, Aaronson and Christiano introduced the idea of hidden subspace states to
build public-key quantum money STOC'12. Since then, this idea has been applied to realize …

Indistinguishability obfuscation from circular security

R Gay, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …

Witness encryption and null-IO from evasive LWE

V Vaikuntanathan, H Wee, D Wichs - … on the Theory and Application of …, 2022 - Springer
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …

Optimal broadcast encryption and CP-ABE from evasive lattice assumptions

H Wee - Annual International Conference on the Theory and …, 2022 - Springer
We present a new, simple candidate broadcast encryption scheme for N users with
parameter size poly (log N). We prove security of our scheme under a non-standard variant …

Candidate iO from homomorphic encryption schemes

Z Brakerski, N Döttling, S Garg, G Malavolta - Journal of Cryptology, 2023 - Springer
We propose a new approach to construct general-purpose indistinguishability obfuscation
(iO). Our construction is obtained via a new intermediate primitive that we call split fully …

Registered (inner-product) functional encryption

D Francati, D Friolo, M Maitra, G Malavolta… - … Conference on the …, 2023 - Springer
Registered encryption (Garg et al., TCC'18) is an emerging paradigm that tackles the key-
escrow problem associated with identity-based encryption by replacing the private-key …

Revocable cryptography from learning with errors

P Ananth, A Poremba, V Vaikuntanathan - Theory of Cryptography …, 2023 - Springer
Quantum cryptography leverages unique properties of quantum information in order to
construct cryptographic primitives that are oftentimes impossible classically. In this work, we …

Another round of breaking and making quantum money: How to not build it from lattices, and more

J Liu, H Montgomery, M Zhandry - … on the Theory and Applications of …, 2023 - Springer
This work provides both negative and positive results for publicly verifiable quantum money.
In the first part, we give a general theorem, showing that a certain natural class of quantum …

New approaches for quantum copy-protection

S Aaronson, J Liu, Q Liu, M Zhandry… - Advances in Cryptology …, 2021 - Springer
Quantum copy-protection uses the unclonability of quantum states to construct quantum
software that provably cannot be pirated. copy-protection would be immensely useful, but …