{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:16:23Z","timestamp":1759637783868,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,11,22]],"date-time":"2016-11-22T00:00:00Z","timestamp":1479772800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Algorithmica"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s00453-016-0250-8","type":"journal-article","created":{"date-parts":[[2016,11,22]],"date-time":"2016-11-22T12:20:48Z","timestamp":1479817248000},"page":"1286-1317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1712-3026","authenticated-orcid":false,"given":"Takashi","family":"Yamakawa","sequence":"first","affiliation":[]},{"given":"Shota","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Noboru","family":"Kunihiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,22]]},"reference":[{"key":"250_CR1","doi-asserted-by":"crossref","unstructured":"Ananth, P.V., Gupta, D., Ishai, Y., Sahai, A.: Optimizing obfuscation: avoiding Barrington\u2019s theorem. In: ACM SIGSAC 2014, pp. 646\u2013658 (2014)","DOI":"10.1145\/2660267.2660342"},{"key":"250_CR2","doi-asserted-by":"crossref","unstructured":"Barak, B., Garg, S., Kalai, Y.T., Paneth, O., Sahai, A.: Protecting obfuscation against algebraic attacks. In: EUROCRYPT, pp. 221\u2013238 (2014)","DOI":"10.1007\/978-3-642-55220-5_13"},{"key":"250_CR3","doi-asserted-by":"crossref","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: CRYPTO, pp. 1\u201318 (2001)","DOI":"10.1007\/3-540-44647-8_1"},{"key":"250_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: ACM CCS\u201912, pp. 784\u2013796 (2012)","DOI":"10.1145\/2382196.2382279"},{"key":"250_CR5","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"2","key":"250_CR6","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364\u2013383 (1986)","journal-title":"SIAM J. Comput."},{"key":"250_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: EUROCRYPT, pp. 223\u2013238 (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"250_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: CRYPTO, pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"250_CR9","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D Boneh","year":"2002","unstructured":"Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemp. Math. 324, 71\u201390 (2002)","journal-title":"Contemp. Math."},{"key":"250_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: CRYPTO (2014)","DOI":"10.1007\/978-3-662-44371-2_27"},{"key":"250_CR11","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Rothblum, G.N.: Virtual black-box obfuscation for all circuits via generic graded encoding. In: TCC, pp. 1\u201325 (2014)","DOI":"10.1007\/978-3-642-54242-8_1"},{"key":"250_CR12","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Fouque, P.-A., Lee, C., Minaud, B., Ryu, H.: Cryptanalysis of the new CLT multilinear map over the integers. In: EUROCRYPT 2016 Part I, pp. 509\u2013536 (2016)","DOI":"10.1007\/978-3-662-49890-3_20"},{"key":"250_CR13","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Han, K., Lee, C., Ryu, H., Stehl\u00e9, D.: Cryptanalysis of the multilinear map over the integers. In: EUROCRYPT 2015 Part I, pp. 3\u201312 (2015)","DOI":"10.1007\/978-3-662-46800-5_1"},{"issue":"2","key":"250_CR14","doi-asserted-by":"crossref","first-page":"303","DOI":"10.4134\/BKMS.2009.46.2.303","volume":"46","author":"JH Cheon","year":"2009","unstructured":"Cheon, J.H., Lee, D.H.: A note on self-bilinear maps. Bull. Korean Math. Soc. 46(2), 303\u2013309 (2009)","journal-title":"Bull. Korean Math. Soc."},{"key":"250_CR15","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Lee, M.S., Lepoint, T., Tibouchi, M.: Cryptanalysis of GGH15 multilinear maps. In: CRYPTO 2016 Part II, pp. 607\u2013628 (2016)","DOI":"10.1007\/978-3-662-53008-5_21"},{"key":"250_CR16","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: CRYPTO (1), pp. 476\u2013493 (2013)","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"250_CR17","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Lepoint, T., Tibouchi, M.: New multilinear maps over the integers. In: CRYPTO 2015 Part I, pp. 267\u2013286 (2015)","DOI":"10.1007\/978-3-662-47989-6_13"},{"issue":"6","key":"250_CR18","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"250_CR19","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: EUROCRYPT, pp. 1\u201317 (2013)","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"250_CR20","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S., Raykova, M.: Two-round secure MPC from indistinguishability obfuscation. In: TCC, pp. 74\u201394 (2014)","DOI":"10.1007\/978-3-642-54242-8_4"},{"key":"250_CR21","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: FOCS, pp. 40\u201349 (2013)","DOI":"10.1109\/FOCS.2013.13"},{"key":"250_CR22","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: CRYPTO (2), pp. 479\u2013499 (2013)","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"250_CR23","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Sahai, A., Waters, B.: Witness encryption and its applications. In: STOC, pp. 467\u2013476 (2013)","DOI":"10.1145\/2488608.2488667"},{"key":"250_CR24","doi-asserted-by":"crossref","unstructured":"Garg, S., Miles, E., Mukherjee, P., Sahai, A., Srinivasan, A., Zhandry, M.: Secure obfuscation in a weak multilinear map model. Cryptology ePrint Archive, Report 2016\/817. http:\/\/eprint.iacr.org\/2016\/817 (2016)","DOI":"10.1007\/978-3-662-53644-5_10"},{"key":"250_CR25","doi-asserted-by":"crossref","unstructured":"Gentry, C., Gorbunov, S., Halevi, S.: Graph-induced multilinear maps from lattices. In: TCC 2015 Part II, pp. 498\u2013527 (2015)","DOI":"10.1007\/978-3-662-46497-7_20"},{"key":"250_CR26","doi-asserted-by":"crossref","unstructured":"Gentry, C., Lewko, A.B., Sahai, A., Waters, B.: Indistinguishability obfuscation from the multilinear subgroup elimination assumption. In: FOCS 2015, pp. 151\u2013170 (2015)","DOI":"10.1109\/FOCS.2015.19"},{"key":"250_CR27","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC, pp. 25\u201332 (1989)","DOI":"10.1145\/73007.73010"},{"key":"250_CR28","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Gordon, S.D., Goyal, V., Jain, A., Katz, J., Liu, F.-H., Sahai, A., Shi, E., Zhou, H.-S.: Multi-input functional encryption. In: Eurocrypt (2014)","DOI":"10.1007\/978-3-642-55220-5_32"},{"key":"250_CR29","doi-asserted-by":"crossref","unstructured":"Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based encryption for circuits. In: STOC, pp. 545\u2013554 (2013)","DOI":"10.1145\/2488608.2488677"},{"key":"250_CR30","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"250_CR31","doi-asserted-by":"crossref","unstructured":"Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for NP. In: EUROCRYPT, pp. 339\u2013358 (2006)","DOI":"10.1007\/11761679_21"},{"key":"250_CR32","doi-asserted-by":"crossref","unstructured":"Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: EUROCRYPT, pp. 415\u2013432 (2008)","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"250_CR33","unstructured":"Hofheinz, D.: Fully secure constrained pseudorandom functions using random oracles. Cryptology ePrint Archive, Report 2014\/372. http:\/\/eprint.iacr.org\/ (2014)"},{"key":"250_CR34","doi-asserted-by":"crossref","unstructured":"Hofheinz, D., Kiltz, E.: The group of signed quadratic residues and applications. In: CRYPTO, pp. 637\u2013653 (2009)","DOI":"10.1007\/978-3-642-03356-8_37"},{"key":"250_CR35","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Sahai, A., Waters, B.: Replacing a random oracle: full domain hash from indistinguishability obfuscation. In: Eurocrypt (2014)","DOI":"10.1007\/978-3-642-55220-5_12"},{"key":"250_CR36","doi-asserted-by":"crossref","unstructured":"Hu, Y., Jia, H.: Cryptanalysis of GGH map. In: EUROCRYPT 2016 Part I, pp. 537\u2013565 (2016)","DOI":"10.1007\/978-3-662-49890-3_21"},{"key":"250_CR37","doi-asserted-by":"crossref","unstructured":"Joux, A.: A one round protocol for tripartite Diffie\u2013Hellman. In: ANTS, pp. 385\u2013394 (2000)","DOI":"10.1007\/10722028_23"},{"key":"250_CR38","doi-asserted-by":"crossref","unstructured":"Khurana, D., Rao, V., Sahai, A.: Multi-party key exchange for unbounded parties from indistinguishability obfuscation. In: ASIACRYPT 2015 I, pp. 52\u201375 (2015)","DOI":"10.1007\/978-3-662-48797-6_3"},{"key":"250_CR39","doi-asserted-by":"crossref","unstructured":"Kiltz, E., O\u2019Neill, A., Smith, A.: Instantiability of RSA-OAEP under chosen-plaintext attack. In: CRYPTO, pp. 295\u2013313 (2010)","DOI":"10.1007\/978-3-642-14623-7_16"},{"key":"250_CR40","doi-asserted-by":"crossref","unstructured":"Mei, Q., Li, B., Lu, X., Jia, D.: Chosen ciphertext secure encryption under factoring assumption revisited. In: Public Key Cryptography, pp. 210\u2013227 (2011)","DOI":"10.1007\/978-3-642-19379-8_13"},{"issue":"5","key":"250_CR41","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A Menezes","year":"1993","unstructured":"Menezes, A., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39(5), 1639\u20131646 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"250_CR42","doi-asserted-by":"crossref","unstructured":"Pandey, O., Prabhakaran, M., Sahai, A.: Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP. In: TCC 2015 Part II, pp. 638\u2013667 (2015)","DOI":"10.1007\/978-3-662-46497-7_25"},{"key":"250_CR43","doi-asserted-by":"crossref","unstructured":"Pass, R., Seth, K., Telang, S.: Indistinguishability obfuscation from semantically-secure multilinear encodings. In: CRYPTO 2014 Part I, pp. 500\u2013517 (2014)","DOI":"10.1007\/978-3-662-44371-2_28"},{"key":"250_CR44","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: EUROCRYPT, pp. 457\u2013473 (2005)","DOI":"10.1007\/11426639_27"},{"key":"250_CR45","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: STOC (2014)","DOI":"10.1145\/2591796.2591825"},{"key":"250_CR46","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing (in Japanese). In: SCIS (2000)"},{"key":"250_CR47","doi-asserted-by":"crossref","unstructured":"Seurin, Y.: New constructions and applications of trapdoor DDH groups. In: Public Key Cryptography, pp. 443\u2013460 (2013)","DOI":"10.1007\/978-3-642-36362-7_27"},{"key":"250_CR48","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT, pp. 114\u2013127 (2005)","DOI":"10.1007\/11426639_7"}],"container-title":["Algorithmica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00453-016-0250-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-016-0250-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-016-0250-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T17:27:51Z","timestamp":1568568471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00453-016-0250-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,22]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["250"],"URL":"https:\/\/doi.org\/10.1007\/s00453-016-0250-8","relation":{},"ISSN":["0178-4617","1432-0541"],"issn-type":[{"type":"print","value":"0178-4617"},{"type":"electronic","value":"1432-0541"}],"subject":[],"published":{"date-parts":[[2016,11,22]]}}}