Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation

نویسندگان

  • Huang Zhang
  • Fangguo Zhang
  • Baodian Wei
  • Yusong Du
چکیده

The bilinear map whose domain and range are identical is called self-bilinear map. Once such kind of bilinear map exists, the multilinear map can be constructed easily by using self bilinear map as a component. Yamakawa et al. have introduced the first secure self-bilinear map with auxiliary information based on the integer factoring assumption in Crypto 2014. Inspired by their work, we find that any encoding system with particular properties could be used to build self-bilinear map. We generalize them as one way encoding system and propose a generic construction of self-bilinear map. For cryptographic use, we define a new encoding division assumption to make the analog DDHP hard. We show that one level encoding of graded encoding system which is used to build multilinear map nowadays satisfy all the properties of one way encoding system. We also present an instance that is build on GGH graded encoding scheme and analyze how hard the encoding division problem is. Our self-bilinear map is believed to be quantum resistance. It seems more secure than the scheme of Yamakawa et al. Moreover, the encoding size of n-multilinear built on our self-bilinear map is smaller than that of GGH scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation

We present new constructions of two-message and one-message witness-indistinguishable proofs (ZAPs and NIWIs). This includes: – ZAPs (or, equivalently, non-interactive zero-knowledge in the common random string model) from indistinguishability obfuscation and one-way functions. – NIWIs from indistinguishability obfuscation and one-way permutations. The previous construction of ZAPs [Dwork and N...

متن کامل

Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation

We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and one-way functions, thereby providing the first candidate that is not based on the hardness of factoring. Our construction shows that even highly structured primitives, such as trapdoor permutations, can be potentially based on hardness assumptions with noisy structures such as those used in candid...

متن کامل

A Note on Black-Box Separations for Indistinguishability Obfuscation

Mahmoody et al. (TCC 2016-A) showed that basing indistinguishability obfuscation (IO) on a wide range of primitives in a black-box way is as hard as basing public-key cryptography on one-way functions. The list included any primitive P that could be realized relative to random trapdoor permutation or degree-O(1) graded encoding oracle models in a secure way against computationally unbounded pol...

متن کامل

A Note on Black-Box Complexity of Indistinguishability Obfuscation

Mahmoody et al. (TCC 2016-A) showed that basing indistinguishability obfuscation (IO) on a wide range of primitives in a semi-black-box way is as hard as basing public-key cryptography on one-way functions. The list included any primitive P that can be realized relative to random trapdoor permutations or degree-O(1) graded encoding model for any finite ring secure against computationally unboun...

متن کامل

Obfuscating Point Functions with Multibit Output

We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero everywhere else. We provide a construction that obfuscates these functions. The construction is generic in the sense that it can use any perfectly one-way (POW) function or obfuscator for point functions. Analyzing this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015