Relaxed Two-to-One Recoding Schemes
نویسندگان
چکیده
A two-to-one recoding (TOR) scheme is a new cryptographic primitive, proposed in the recent work of Gorbunov, Vaikuntanathan, and Wee (GVW), as a means to construct attribute-based encryption (ABE) schemes for all boolean circuits. GVW show that TOR schemes can be constructed assuming the hardness of the learning-with-errors (LWE) problem. We propose a slightly weaker variant of TOR schemes called correlation-relaxed two-to-one recoding (CR-TOR). Unlike the TOR schemes, our weaker variant does not require an encoding function to be pseudorandom on correlated inputs. We instead replace it with an indistinguishability property that states a ciphertext is hard to decrypt without access to a certain encoding. The primary benefit of this relaxation is that it allows the construction of ABE for circuits using the TOR paradigm from a broader class of cryptographic assumptions. We show how to construct a CR-TOR scheme from the noisy cryptographic multilinear maps of Garg, Gentry, and Halevi as well as those of Coron, Lepoint, and Tibouchi. Our framework leads to an instantiation of ABE for circuits that is conceptually different from the existing constructions.
منابع مشابه
Design of 16-bit Multiplier Using Efficient Recoding Techniques
Multiplier is the major component for processing of large amount of data in DSP applications. Using different recoding schemes in Fused Add-Multiply (FAM) design for the reduction of power and look up tables. The performance of 16-bit signed and unsigned multipliers were designed and obtained results are tabulated using Efficient Modified Booth Recoding (EMBR) techniques, which can be used for ...
متن کاملHigh order relaxed schemes for nonlinear reaction diffusion problems
Different relaxation approximations to partial differential equations, including conservation laws, Hamilton-Jacobi equations, convection-diffusion problems, gas dynamics problems, have been recently proposed. The present paper focuses onto diffusive relaxed schemes for the numerical approximation of nonlinear reaction diffusion equations. High order methods are obtained by coupling ENO and WEN...
متن کاملEfficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
In elliptic curve cryptosystems, scalar multiplications performed on the curves have much effect on the efficiency of the schemes, and many efficient methods have been proposed. In particular, recoding methods of the scalars play an important role in the performance of the algorithm used. For integer radices, non-adjacent form (NAF) and its generalizations (e.g., generalized non-adjacent form (...
متن کاملNew High-Speed and Low-Power Radix-2 Multiplication Algorithms
In this paper, a new recursive multibit recoding multiplication algorithm is introduced. It provides a general space-time partitioning of the multiplication problem that not only enables a drastic reduction of the number of partial products (N/r), but also eliminates the need of pre-computing odd multiples of the multiplicand in higher radix (r≥3) multiplication. Based on a mathematical proof t...
متن کاملOn Numerical Entropy Inequalities for a Class of Relaxed Schemes
In [4], Jin and Xin developed a class of firstand second-order relaxing schemes for nonlinear conservation laws. They also obtained the relaxed schemes for conservation laws by using a Hilbert expansion for the relaxing schemes. The relaxed schemes were proved to be total variational diminishing (TVD) in the zero relaxation limit for scalar equations. In this paper, by properly choosing the num...
متن کامل