{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:21:26Z","timestamp":1740122486195,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,16]],"date-time":"2016-08-16T00:00:00Z","timestamp":1471305600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472309","61303217"],"award-info":[{"award-number":["61472309","61303217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502372"],"award-info":[{"award-number":["61502372"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Program of Anhui Province Education Department","award":["KJ2016A626"],"award-info":[{"award-number":["KJ2016A626"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2016YFB0800600"],"award-info":[{"award-number":["2016YFB0800600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2014JQ8313"],"award-info":[{"award-number":["2014JQ8313"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10623-016-0266-8","type":"journal-article","created":{"date-parts":[[2016,8,16]],"date-time":"2016-08-16T04:31:15Z","timestamp":1471321875000},"page":"311-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of multilinear maps from ideal lattices: revisited"],"prefix":"10.1007","volume":"84","author":[{"given":"Huiwen","family":"Jia","sequence":"first","affiliation":[]},{"given":"Yupu","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,16]]},"reference":[{"key":"266_CR1","doi-asserted-by":"crossref","unstructured":"Boneh D., Silverberg A.: Applications of multilinear forms to cryptography. Contemp. Math. 324, 71\u201390 (2003).","DOI":"10.1090\/conm\/324\/05731"},{"key":"266_CR2","unstructured":"Boneh D., Wu D.J., Zimmerman J.: Immunizing multilinear maps against zeroizing attacks. IACR Cryptology ePrint Archive, Report 2014\/930. http:\/\/eprint.iacr.org\/2014\/930 (2014)."},{"key":"266_CR3","doi-asserted-by":"crossref","unstructured":"Cheon J.H., Han K., Lee C., et al.: Cryptanalysis of the multilinear map over the integers. In: Oswald E., Fischlin M. (eds.) Proceedings of Advances in Cryptology\u2014EUROCRYPT 2015 Part I, Sofia, Bulgaria, pp. 3\u201312 (2015).","DOI":"10.1007\/978-3-662-46800-5_1"},{"key":"266_CR4","doi-asserted-by":"crossref","unstructured":"Cheon J.H., Fouque P.A., Lee C., et al.: Cryptanalysis of the new CLT multilinear map over the integers. In: Proceedings of Advances in Cryptology\u2014EUROCRYPT 2016, Vienna, Austria (2016).","DOI":"10.1007\/978-3-662-49890-3_20"},{"key":"266_CR5","doi-asserted-by":"crossref","unstructured":"Coron J.S., Lenpoint T., Tibouchi M.: Practical multilinear maps over the integers. In: Canetti R., Garay J.A. (eds.) Proceedings of Advances in Cryptology\u2014CRYPTO 2013 Part I, Santa Barbara, CA, USA, pp. 476\u2013493 (2013).","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"266_CR6","unstructured":"Coron J.S., Lenpoint T., Tibouchi M.: Cryptanalysis of two candidate fixes of multilinear maps over the integers. IACR Cryptology ePrint Archive, Report 2014\/975. http:\/\/eprint.iacr.org\/2014\/975 (2014)."},{"key":"266_CR7","doi-asserted-by":"crossref","unstructured":"Coron J.S., Lenpoint T., Tibouchi M.: New multilinear maps over the integers. In: Gennaro R., Robshaw M. (eds.) Proceedings of Advances in Cryptology\u2014CRYPTO 2015 Part I, Santa Barbara, CA, USA, pp. 267\u2013286 (2015).","DOI":"10.1007\/978-3-662-47989-6_13"},{"key":"266_CR8","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S.: Candidate multilinear maps from ideal lattices. In: Johansson T., Nguyen P.Q. (eds.) Proceedings of Advances in Cryptology\u2014EUROCRYPT 2013, Athens, Greece, pp. 1\u201317 (2013).","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"266_CR9","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., et al.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Shmoys D., Reingold O. (eds.) Proceedings of Foundations of Computer Science\u2014FOCS2013, Berkeley, CA, USA, pp. 40\u201349 (2013).","DOI":"10.1109\/FOCS.2013.13"},{"key":"266_CR10","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., et al.: Attribute-based encryption for circuits from multilinear maps. IACR Cryptology ePrint Archive, Report 2013\/128. http:\/\/eprint.iacr.org\/2013\/128 (2013).","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"266_CR11","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., et al.: Attribute-based encryption for circuits from multilinear maps. In: Canetti R., Garay J.A. (eds.) Proceedings of Advances in Cryptology\u2014CRYPTO 2013 Part II, Santa Barbara, CA, USA, pp. 479\u2013499 (2013).","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"266_CR12","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., et al.: Witness encryption and its applications. In: Boneh D., Roughgarden T. (eds.) Proceedings of 45th ACM Symposium on Theory of Computing\u2014STOC 2013, Palo Alto, California, USA, pp. 467\u2013476 (2013).","DOI":"10.1145\/2488608.2488667"},{"key":"266_CR13","unstructured":"Garg S., Gentry C., Halevi S., et al.: Fully secure attribute based encryption from multilinear maps. IACR Cryptology ePrint Archive, Report 2014\/622. http:\/\/eprint.iacr.org\/2014\/622 (2014)."},{"key":"266_CR14","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., et al.: Functional encryption without obfuscation. In: Kushilevitz E., Alkin T. (eds.) Proceedings of Theory of Cryptography\u2014TCC 2016 Part II, Tel Aviv, Israel, pp. 480\u2013511 (2016).","DOI":"10.1007\/978-3-662-49099-0_18"},{"key":"266_CR15","doi-asserted-by":"crossref","unstructured":"Gentry C., Gorbunov S., Halevi S.: Graph-induced multilinear maps from lattices. In: Dodis Y., Nielsen J.B. (eds.) Proceedings of Theory of Cryptography\u2014TCC 2015 Part II, Warsaw, Poland, pp. 498\u2013527 (2015).","DOI":"10.1007\/978-3-662-46497-7_20"},{"key":"266_CR16","unstructured":"Gentry C., Halevi S., Maji H.K., et al.: Zeroizing without Zeroes: cryptanalyzing multilinear maps without encodings of Zero. IACR Cryptology ePrint Archive, Report 2014\/929. http:\/\/eprint.iacr.org\/2014\/929 (2014)."},{"key":"266_CR17","doi-asserted-by":"crossref","unstructured":"Hohenberger S., Sahai A., Waters B.: Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. IACR Cryptology ePrint Archive, Report 2013\/434. http:\/\/eprint.iacr.org\/2013\/434 (2013).","DOI":"10.1007\/978-3-642-40041-4_27"},{"key":"266_CR18","doi-asserted-by":"crossref","unstructured":"Hohenberger S., Sahai A., Waters B.: Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Canetti R., Garay J.A. (eds.) Proceedings of Advances in Cryptology\u2014CRYPTO 2013 Part I, Santa Barbara, CA, USA, pp. 494\u2013512 (2013).","DOI":"10.1007\/978-3-642-40041-4_27"},{"key":"266_CR19","doi-asserted-by":"crossref","unstructured":"Hu Y.P., Jia H.W.: Cryptanalysis of GGH map. In: Proceedings of Advances in Cryptology\u2014EUROCRYPT 2016, Vienna, Austria (2016).","DOI":"10.1007\/978-3-662-49890-3_21"},{"key":"266_CR20","unstructured":"Langlois A., St\u00e9hl D., Steinfeld R.: GGHLite: more efficient multilinear maps from ideal lattices. In: Nguyen P.Q., Oswald E. (eds.) Proceedings of Advances in Cryptology\u2014EUROCRYPT 2014, Denmark, Copenhagen, pp. 239\u2013256 (2015)."},{"key":"266_CR21","unstructured":"Zhandry M.: Adaptively secure broadcast encryption with small system parameters. IACR Cryptology ePrint Archive, Report 2014\/757. http:\/\/eprint.iacr.org\/2014\/757 (2014)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0266-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0266-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0266-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0266-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T03:25:57Z","timestamp":1589685957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0266-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,16]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["266"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0266-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,8,16]]}}}