The general structure of an Affine Determinant Program (ADP): the program is specified by a collection of matrices. To evaluate the program on input x, first compute the linear combination of matrices, where the coefficients are the input bits. Then take the determinant. We give candidate obfuscators for such programs, which can be lifted to obfuscators for general programs using known techniques. We use this obfuscator to construct public key encryption with very fast key generation. See .
Intractable mathematical problems are the heart of modern cryptography. Unfortunately, until someone proves that P≠NP, the intractability of such problems cannot be proven unconditionally and can only be conjectured. Then how do we discover novel mathematical structures, figure out how to use them, and gain confidence in their security? Through extensive study, development of new applications, attacks, and mitigations.

Failing to Generalize Cocks' IBE
By Mark Zhandry
In CFail 2024

Iterated Inhomogeneous Polynomials
By Jiaxin Guan and Mark Zhandry
In CFail 2021

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
By James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai and Mark Zhandry
In ITCS 2020

The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks
By Fermi Ma and Mark Zhandry
In TCC 2018

Preventing Zeroizing Attacks on GGH15
By James Bartusek, Jiaxin Guan, Fermi Ma and Mark Zhandry
In TCC 2018

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
By Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi and Mark Zhandry
In MathCrypt 2018, Journal of Mathematical Cryptology

Secure Obfuscation in a Weak Multilinear Map Model
By Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan and Mark Zhandry
In TCC 2016-B

Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
By Eric Miles, Amit Sahai and Mark Zhandry
In CRYPTO 2016

Post-Zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
By Saikrishna Badrinarayanan, Eric Miles, Amit Sahai and Mark Zhandry
In EUROCRYPT 2016

Functional Encryption without Obfuscation
By Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry
In TCC 2016-A

How to Avoid Obfuscation Using Witness PRFs
By Mark Zhandry
In TCC 2016-A

Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
By Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry and Joe Zimmerman
In EUROCRYPT 2015

Adaptively Secure Broadcast Encryption with Small System Parameters
By Mark Zhandry

Low Overhead Broadcast Encryption from Multilinear Maps
By Dan Boneh, Brent Waters and Mark Zhandry
In CRYPTO 2014

Fully Secure Attribute Based Encryption from Multilinear Maps
By Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry