Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
نویسندگان
چکیده
The bilinear map whose domain and range are identical is called self-bilinear map. Once such kind of bilinear map exists, the multilinear map can be constructed easily by using self bilinear map as a component. Yamakawa et al. have introduced the first secure self-bilinear map with auxiliary information based on the integer factoring assumption in Crypto 2014. Inspired by their work, we find that any encoding system with particular properties could be used to build self-bilinear map. We generalize them as one way encoding system and propose a generic construction of self-bilinear map. For cryptographic use, we define a new encoding division assumption to make the analog DDHP hard. We show that one level encoding of graded encoding system which is used to build multilinear map nowadays satisfy all the properties of one way encoding system. We also present an instance that is build on GGH graded encoding scheme and analyze how hard the encoding division problem is. Our self-bilinear map is believed to be quantum resistance. It seems more secure than the scheme of Yamakawa et al. Moreover, the encoding size of n-multilinear built on our self-bilinear map is smaller than that of GGH scheme.
منابع مشابه
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
We present new constructions of two-message and one-message witness-indistinguishable proofs (ZAPs and NIWIs). This includes: – ZAPs (or, equivalently, non-interactive zero-knowledge in the common random string model) from indistinguishability obfuscation and one-way functions. – NIWIs from indistinguishability obfuscation and one-way permutations. The previous construction of ZAPs [Dwork and N...
متن کاملPerfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation
We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and one-way functions, thereby providing the first candidate that is not based on the hardness of factoring. Our construction shows that even highly structured primitives, such as trapdoor permutations, can be potentially based on hardness assumptions with noisy structures such as those used in candid...
متن کاملA Note on Black-Box Separations for Indistinguishability Obfuscation
Mahmoody et al. (TCC 2016-A) showed that basing indistinguishability obfuscation (IO) on a wide range of primitives in a black-box way is as hard as basing public-key cryptography on one-way functions. The list included any primitive P that could be realized relative to random trapdoor permutation or degree-O(1) graded encoding oracle models in a secure way against computationally unbounded pol...
متن کاملA Note on Black-Box Complexity of Indistinguishability Obfuscation
Mahmoody et al. (TCC 2016-A) showed that basing indistinguishability obfuscation (IO) on a wide range of primitives in a semi-black-box way is as hard as basing public-key cryptography on one-way functions. The list included any primitive P that can be realized relative to random trapdoor permutations or degree-O(1) graded encoding model for any finite ring secure against computationally unboun...
متن کاملObfuscating Point Functions with Multibit Output
We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero everywhere else. We provide a construction that obfuscates these functions. The construction is generic in the sense that it can use any perfectly one-way (POW) function or obfuscator for point functions. Analyzing this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015