{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:34:15Z","timestamp":1763458455436,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1111599, 1223623, 1633282, 1562888, 1565208"],"award-info":[{"award-number":["1111599, 1223623, 1633282, 1562888, 1565208"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["W911NF-15-C-0236, W911NF-15-C-0227"],"award-info":[{"award-number":["W911NF-15-C-0236, W911NF-15-C-0227"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978314","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"981-992","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["5Gen"],"prefix":"10.1145","author":[{"given":"Kevin","family":"Lewi","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Alex J.","family":"Malozemoff","sequence":"additional","affiliation":[{"name":"Galois, Portland, OR, USA"}]},{"given":"Daniel","family":"Apon","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Brent","family":"Carmer","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Adam","family":"Foltzer","sequence":"additional","affiliation":[{"name":"Galois, Portland, OR, USA"}]},{"given":"Daniel","family":"Wagner","sequence":"additional","affiliation":[{"name":"Galois, Portland, OR, USA"}]},{"given":"David W.","family":"Archer","sequence":"additional","affiliation":[{"name":"Galois, Portland, OR, USA"}]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Jonathan","family":"Katz","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Mariana","family":"Raykova","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_31"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660342"},{"key":"e_1_3_2_1_4_1","unstructured":"D. Apon Y. Huang J. Katz and A. J. Malozemoff. Implementing cryptographic program obfuscation. Cryptology ePrint Archive Report 2014\/779 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_21"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Badrinarayanan E. Miles A. Sahai and M. Zhandry. Post-zeroizing obfuscation: The case of evasive circuits. Cryptology ePrint Archive Report 2015\/167 2015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704152"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_28"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987260.1987281"},{"key":"e_1_3_2_1_12_1","unstructured":"D. Boneh and A. Silverberg. Applications of multilinear forms to cryptography. Cryptology ePrint Archive Report 2002\/080 2002."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. Boneh B. Waters and M. Zhandry. Low overhead broadcast encryption from multilinear maps. Cryptology ePrint Archive Report 2014\/195 2014.","DOI":"10.1007\/978-3-662-44371-2_12"},{"key":"e_1_3_2_1_14_1","unstructured":"D. Boneh D. J. Wu and J. Zimmerman. Immunizing multilinear maps against zeroizing attacks. Cryptology ePrint Archive Report 2014\/930 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J. H. Cheon J. Jeong and C. Lee. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without an encoding of zero. Cryptology ePrint Archive Report 2016\/139 2016.","DOI":"10.1112\/S1461157016000371"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_13"},{"key":"e_1_3_2_1_21_1","unstructured":"Cryptol. http:\/\/cryptol.net\/. Accessed: 2016-05-02."},{"key":"e_1_3_2_1_22_1","unstructured":"N. D\u00f6ttling S. Garg D. Gupta P. Miao and P. Mukherjee. Obfuscation from low noise multilinear maps. Cryptology ePrint Archive Report 2016\/599 2016."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"S. Garg C. Gentry S. Halevi and M. Zhandry. Fully secure attribute based encryption from multilinear maps. Cryptology ePrint Archive Report 2014\/622 2014.","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488667"},{"key":"e_1_3_2_1_27_1","unstructured":"S. Garg P. Mukherjee and A. Srinivasan. Obfuscation without the vulnerabilities of multilinear maps. Cryptology ePrint Archive Report 2016\/390 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_20"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.19"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_32"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_21"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_14"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978376"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_2"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49387-8_17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_22"},{"key":"e_1_3_2_1_37_1","unstructured":"E. Miles A. Sahai and M. Zhandry. Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks. Cryptology ePrint Archive Report 2016\/588 2016."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"R. Pass K. Seth and S. Telang. Indistinguishability obfuscation from semantically-secure multi-linear encodings. Cryptology ePrint Archive Report 2013\/781 2013.","DOI":"10.1007\/978-3-662-44371-2_28"},{"key":"e_1_3_2_1_39_1","unstructured":"A. Sahai and M. Zhandry. Obfuscating low-rank matrix branching programs. Cryptology ePrint Archive Report 2014\/773 2014."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_15"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978314","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978314","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:24:45Z","timestamp":1763457885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978314"}},"subtitle":["A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":40,"alternative-id":["10.1145\/2976749.2978314","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978314","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}