{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:06Z","timestamp":1762005066988},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T00:00:00Z","timestamp":1544054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s00145-018-9307-y","type":"journal-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T19:49:11Z","timestamp":1544125751000},"page":"547-565","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cryptanalysis of the CLT13 Multilinear Map"],"prefix":"10.1007","volume":"32","author":[{"given":"Jung Hee","family":"Cheon","sequence":"first","affiliation":[]},{"given":"Kyoohyung","family":"Han","sequence":"additional","affiliation":[]},{"given":"Changmin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hansol","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Stehl\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"9307_CR1","unstructured":"M.\u00a0Abdalla, F.\u00a0Benhamouda, D.\u00a0Pointcheval, Disjunctions for hash proof systems: New constructions and applications, in Advances in Cryptology\u2014EUROCRYPT 2015 (2015), pp. 69\u2013100"},{"key":"9307_CR2","unstructured":"P.V. Ananth, D.\u00a0Gupta, Y.\u00a0Ishai, A.\u00a0Sahai, Optimizing obfuscation: Avoiding barrington\u2019s theorem, in Proceedings of the 2014 ACM SIGSAC (2014), pp. 646\u2013658"},{"key":"9307_CR3","unstructured":"N.\u00a0Attrapadung, Fully secure and succinct attribute based encryption for circuits from multi-linear maps. IACR Cryptology ePrint Archive (2014)"},{"key":"9307_CR4","unstructured":"S.\u00a0Badrinarayanan, E.\u00a0Miles, A.\u00a0Sahai, M.\u00a0Zhandry, Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits, in Advances in Cryptology\u2014EUROCRYPT 2016 (2016), pp. 764\u2013791"},{"key":"9307_CR5","first-page":"833","volume":"2013","author":"F Benhamouda","year":"2013","unstructured":"F.\u00a0Benhamouda, D.\u00a0Pointcheval, Verifier-based password-authenticated key exchange: New models and constructions. IACR Cryptol. ePrint Arch.\n                           2013, 833 (2013)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"9307_CR6","unstructured":"D.\u00a0Boneh, K.\u00a0Lewi, H.W. Montgomery, A.\u00a0Raghunathan, Key homomorphic prfs and their applications, in Advances in Cryptology\u2014CRYPTO 2013 (2013), pp. 410\u2013428"},{"key":"9307_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D Boneh","year":"2003","unstructured":"D.\u00a0Boneh, A.\u00a0Silverberg, Applications of multilinear forms to cryptography. Contemp. Math. Am. Math. Soc.\n                           324, 71\u201390 (2003)","journal-title":"Contemp. Math. Am. Math. Soc."},{"key":"9307_CR8","unstructured":"D.\u00a0Boneh, D.J. Wu, J.\u00a0Zimmerman, Immunizing multilinear maps against zeroizing attacks. IACR Cryptology ePrint Archive (2014)"},{"key":"9307_CR9","unstructured":"J.H. Cheon, J.\u00a0Coron, J.\u00a0Kim, M.S. Lee, T.\u00a0Lepoint, M.\u00a0Tibouchi, A.\u00a0Yun, Batch fully homomorphic encryption over the integers, in Advances in Cryptology\u2014EUROCRYPT 2013 (2013), pp. 315\u2013335"},{"key":"9307_CR10","unstructured":"J.H. Cheon, P.\u00a0Fouque, C.\u00a0Lee, B.\u00a0Minaud, H.\u00a0Ryu, Cryptanalysis of the new CLT multilinear map over the integers, in Advances in Cryptology\u2014EUROCRYPT 2016 (2016), pp. 509\u2013536"},{"key":"9307_CR11","unstructured":"J.H. Cheon, K.\u00a0Han, C.\u00a0Lee, H.\u00a0Ryu, D.\u00a0Stehl\u00e9, Cryptanalysis of the multilinear map over the integers, in Advances in Cryptology\u2014EUROCRYPT 2015 (2015), pp. 3\u201312"},{"key":"9307_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jnt.2016.04.013","volume":"168","author":"JH Cheon","year":"2016","unstructured":"J.H. Cheon, D.\u00a0Kim, Probability that the k-gcd of products of positive integers is b-friable. J. Number Theory\n                           168, 72\u201380 (2016)","journal-title":"J. Number Theory"},{"key":"9307_CR13","unstructured":"J.\u00a0Coron, C.\u00a0Gentry, S.\u00a0Halevi, T.\u00a0Lepoint, H.K. Maji, E.\u00a0Miles, M.\u00a0Raykova, A.\u00a0Sahai, M.\u00a0Tibouchi, Zeroizing without low-level zeroes: New MMAP attacks and their limitations, in Advances in Cryptology\u2014CRYPTO 2015 (2015), pp. 247\u2013266"},{"key":"9307_CR14","unstructured":"J.\u00a0Coron, M.S. Lee, T.\u00a0Lepoint, M.\u00a0Tibouchi, Zeroizing attacks on indistinguishability obfuscation over CLT13, in Public-Key Cryptography\u2014PKC 2017 (2017), pp. 41\u201358"},{"key":"9307_CR15","unstructured":"J.\u00a0Coron, T.\u00a0Lepoint, M.\u00a0Tibouchi, Practical multilinear maps over the integers, in Advances in Cryptology\u2014CRYPTO 2013 (2013), pp. 476\u2013493"},{"key":"9307_CR16","first-page":"975","volume":"2014","author":"J Coron","year":"2014","unstructured":"J.\u00a0Coron, T.\u00a0Lepoint, M.\u00a0Tibouchi, Cryptanalysis of two candidate fixes of multilinear maps over the integers. IACR Cryptol. ePrint Arch.\n                           2014, 975 (2014)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"9307_CR17","unstructured":"J.\u00a0Coron, T.\u00a0Lepoint, M.\u00a0Tibouchi, New multilinear maps over the integers, in Advances in Cryptology\u2014CRYPTO 2015 (2015), pp. 267\u2013286"},{"key":"9307_CR18","unstructured":"R.\u00a0Fernando, P.M.R. Rasmussen, A.\u00a0Sahai, Preventing CLT attacks on obfuscation with linear overhead, in Advances in Cryptology\u2014ASIACRYPT 2017 (2017), pp. 242\u2013271"},{"issue":"A","key":"9307_CR19","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1112\/S1461157016000218","volume":"19","author":"SD Galbraith","year":"2016","unstructured":"S.D. Galbraith, S.W. Gebregiyorgis, S.\u00a0Murphy, Algorithms for the approximate common divisor problem. LMS J. Comput. Math.\n                           19(A), 58\u201372 (2016)","journal-title":"LMS J. Comput. Math."},{"key":"9307_CR20","unstructured":"S.\u00a0Garg, C.\u00a0Gentry, S.\u00a0Halevi, Candidate multilinear maps from ideal lattices. in Advances in Cryptology\u2014EUROCRYPT 2013 (2013), pp. 1\u201317"},{"key":"9307_CR21","unstructured":"S.\u00a0Garg, C.\u00a0Gentry, S.\u00a0Halevi, M.\u00a0Raykova, A.\u00a0Sahai, B.\u00a0Waters, Candidate indistinguishability obfuscation and functional encryption for all circuits, in IEEE Symposium on Foundations of Computer Science, FOCS (2013), pp. 40\u201349"},{"key":"9307_CR22","doi-asserted-by":"crossref","unstructured":"S.\u00a0Garg, C.\u00a0Gentry, S.\u00a0Halevi, M.\u00a0Zhandry, Fully secure attribute based encryption from multilinear maps. IACR Cryptology ePrint Archive (2014)","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"9307_CR23","doi-asserted-by":"crossref","unstructured":"S.\u00a0Garg, C.\u00a0Gentry, S.\u00a0Halevi, M.\u00a0Zhandry, Fully secure functional encryption without obfuscation. IACR Cryptology ePrint Archive (2014)","DOI":"10.1007\/978-3-662-49099-0_18"},{"key":"9307_CR24","unstructured":"S.\u00a0Garg, C.\u00a0Gentry, S.\u00a0Halevi, M.\u00a0Zhandry. Functional encryption without obfuscation, in Theory of Cryptography\u201413th International Conference, TCC 2016-A (2016), pp. 480\u2013511"},{"key":"9307_CR25","unstructured":"C.\u00a0Gentry, A.B. Lewko, A.\u00a0Sahai, B.\u00a0Waters. Indistinguishability obfuscation from the multilinear subgroup elimination assumption. in Proceedings of FOCS 2015 (2015), pp. 151\u2013170"},{"key":"9307_CR26","unstructured":"C.\u00a0Gentry, A.B. Lewko, B.\u00a0Waters, Witness encryption from instance independent assumptions, in Advances in Cryptology\u2014CRYPTO 2014 (2014), pp. 426\u2013443"},{"key":"9307_CR27","unstructured":"N.\u00a0Howgrave-Graham, Approximate integer common divisors, in Cryptography and Lattices, International Conference, CaLC 2001, Providence, RI, USA, March 29\u201330, 2001, Revised Papers (2001), pp. 51\u201366"},{"key":"9307_CR28","unstructured":"Y.\u00a0Hu, H.\u00a0Jia, Cryptanalysis of GGH map, in Advances in Cryptology\u2014EUROCRYPT 2016 (2016), pp. 537\u2013565"},{"key":"9307_CR29","unstructured":"H.T. Lee, J.H. Seo, Security analysis of multilinear maps over the integers, in Advances in Cryptology\u2014CRYPTO 2014 (2014), pp. 224\u2013240"},{"key":"9307_CR30","unstructured":"K.\u00a0Lewi, H.W. Montgomery, A.\u00a0Raghunathan, Improved constructions of prfs secure against related-key attacks, in Applied Cryptography and Network Security (2014), pp. 44\u201361"},{"issue":"7","key":"9307_CR31","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1080\/00029890.2009.11920976","volume":"116","author":"G Martin","year":"2009","unstructured":"G.\u00a0Martin, E.B. Wong, Almost all integer matrices have no integer eigenvalues. Am. Math. Mon.\n                           116(7), 588\u2013597 (2009)","journal-title":"Am. Math. Mon."},{"key":"9307_CR32","first-page":"878","volume":"2014","author":"E Miles","year":"2014","unstructured":"E.\u00a0Miles, A.\u00a0Sahai, M.\u00a0Weiss, Protecting obfuscation against arithmetic attacks. IACR Cryptol. ePrint Arch., 2014, 878 (2014)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"9307_CR33","unstructured":"R.\u00a0Pass, K.\u00a0Seth, S.\u00a0Telang, Indistinguishability obfuscation from semantically-secure multilinear encodings, in Advances in Cryptology\u2014CRYPTO 2014 (2014), pp. 500\u2013517"},{"issue":"2","key":"9307_CR34","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1137\/0209024","volume":"9","author":"MO Rabin","year":"1980","unstructured":"M.O. Rabin, Probabilistic algorithms in finite fields. SIAM J. Comput.\n                           9(2), 273\u2013280 (1980)","journal-title":"SIAM J. Comput."},{"key":"9307_CR35","unstructured":"M.\u00a0van Dijk, C.\u00a0Gentry, S.\u00a0Halevi, V.\u00a0Vaikuntanathan, Fully homomorphic encryption over the integers, in Advances in Cryptology\u2014EUROCRYPT 2010 (2010), pp. 24\u201343"},{"key":"9307_CR36","unstructured":"M.\u00a0Zhandry, Adaptively secure broadcast encryption with small system parameters. IACR Cryptology ePrint Archive (2014)"},{"key":"9307_CR37","unstructured":"J.\u00a0Zimmerman, How to obfuscate programs directly, in Advances in Cryptology\u2014EUROCRYPT 2015 (2015), pp. 439\u2013467"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-018-9307-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-018-9307-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-018-9307-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T00:05:06Z","timestamp":1575590706000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-018-9307-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,6]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9307"],"URL":"https:\/\/doi.org\/10.1007\/s00145-018-9307-y","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,6]]},"assertion":[{"value":"9 May 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}