Breaking the Sub-Exponential Barrier in Obfustopia

نویسندگان

  • Sanjam Garg
  • Omkant Pandey
  • Akshayaram Srinivasan
  • Mark Zhandry
چکیده

Indistinguishability obfuscation (iO) has emerged as a surprisingly powerful notion. Almost all known cryptographic primitives can be constructed from general purpose iO and other minimalistic assumptions such as one-way functions. A major challenge in this direction of research is to develop novel techniques for using iO since iO by itself offers virtually no protection for secret information in the underlying programs. When dealing with complex situations, often these techniques have to consider an exponential number of hybrids (usually one per input) in the security proof. This results in a sub-exponential loss in the security reduction. Unfortunately, this scenario is becoming more and more common and appears to be a fundamental barrier to many current techniques. A parallel research challenge is building obfuscation from simpler assumptions. Unfortunately, it appears that such a construction would likely incur an exponential loss in the security reduction. Thus, achieving any application of iO from simpler assumptions would also require a sub-exponential loss, even if the iO-to-application security proof incurred a polynomial loss. Functional encryption (FE) is known to be equivalent to iO up to a sub-exponential loss in the FE-to-iO security reduction; yet, unlike iO, FE can be achieved from simpler assumptions (namely, specific multilinear map assumptions) with only a polynomial loss. In the interest of basing applications on weaker assumptions, we therefore argue for using FE as the starting point, rather than iO, and restricting to reductions with only a polynomial loss. By significantly expanding on ideas developed by Garg, Pandey, and Srinivasan (CRYPTO 2016), we achieve the following early results in this line of study: • We construct universal samplers based only on polynomially-secure public-key FE . As an application of this result, we construct a non-interactive multiparty key exchange (NIKE) protocol for an unbounded number of users without a trusted setup. Prior to this work, such constructions were only known from indistinguishability obfuscation. • We also construct trapdoor one-way permutations (OWP) based on polynomially-secure public-key FE . This improves upon the recent result of Bitansky, Paneth, and Wichs (TCC 2016) which requires iO of sub-exponential strength. We proceed in two steps, first giving a construction requiring iO of polynomial strength, and then specializing the FE-to-iO conversion to our specific application. Many of the techniques that have been developed for using iO, including many of those based on the “punctured programming” approach, become inapplicable when we insist on polynomial reductions to FE . As such, our results above require many new ideas that will likely be useful for future works on basing security on FE . ∗University of California, Berkeley, [email protected] †Stony Brook University, [email protected] ‡University of California, Berkeley, [email protected] §Princeton University [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

From Minicrypt to Obfustopia via Private-Key Functional Encryption

Private-key functional encryption enables fine-grained access to symmetrically-encrypted data. Although private-key functional encryption (supporting an unbounded number of keys and ciphertexts) seems significantly weaker than its public-key variant, its known realizations all rely on public-key functional encryption. At the same time, however, up until recently it was not known to imply any pu...

متن کامل

دینامیک سالیتون‌های مدل 6 φ در یک پتانسیل خارجی

  In this paper, we study particle aspects of the φ6 kinks in an external potential. The external potential is implemented by breaking the translational invariance of the system. The dynamics of the kink is calculated for the simple harmonic oscillator (SHO) and barrier potentials. The periodic motion of the kink in the SHO case is compared to the corresponding ordinary (classical) motion. It i...

متن کامل

Can Hidden Gauginos Form Condensates?

Supersymmetry breaking may be linked to the formation of gaugino condensates in a hidden sector. In this work, the process of formation of the condensate is examined in a cosmological context, using an effective field theory of the gaugino bilinear which provides a reasonable interpolation between the highand low-temperature phases. The implementation of anomaly requirements generates a large p...

متن کامل

A Numerical Study of the Sour Gas Reforming in a Dielectric Barrier Discharge Reactor

In this paper, using a one-dimensional simulation model, the reforming process of sour gas, i.e. CH4, CO2, and H2S, to the various charged particles and syngas in a dielectric barrier discharge (DBD) reactor is studied. An electric field is applied across the reactor radius, and thus a non-thermal plasma discharge is formed within the reactor. Based on the space...

متن کامل

A full NT-step O(n) infeasible interior-point method for Cartesian P_*(k) –HLCP over symmetric cones using exponential convexity

In this paper, by using the exponential convexity property of a barrier function, we propose an infeasible interior-point method for Cartesian P_*(k) horizontal linear complementarity problem over symmetric cones. The method uses Nesterov and Todd full steps, and we prove that the proposed algorithm is well define. The iteration bound coincides with the currently best iteration bound for the Ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016