Succinct Garbling Schemes and Applications
نویسندگان
چکیده
Assuming the existence of iO for P/poly and one-way functions, we show how to succinctly garble bounded-space computations (BSC) M : the size of the garbled program (as well as the time needed to generate the garbling) only depends on the size and space (including the input and output) complexity of M , but not its running time. The key conceptual insight behind this construction is a method for using iO to “compress” a computation that can be performed piecemeal, without revealing anything about it. As corollaries of our succinct garbling scheme, we demonstrate the following: • functional encryption for BSC from iO for P/poly and one-way functions; • reusable succinct garbling schemes for BSC from iO for P/poly and one-way functions; • succinct iO for BSC from sub-exponentially-secure iO for P/poly and sub-exponentially secure one-way functions; • (Perfect NIZK) SNARGS for bounded space and witness NP from sub-exponentially-secure iO for P/poly and sub-exponentially-secure one-way functions. Previously such primitives were only know to exists based on “knowledge-based” assumptions (such as SNARKs and/or differing-input obfuscation). We finally demonstrate the first (non-succinct) iO for RAM programs with bounded input and output lengths, that has poly-logarithmic overhead, based on the existence of subexponentially-secure iO for P/poly and sub-exponentially-secure one-way functions. ∗University of California at Santa Barbara, Email: [email protected]. †Cornell University, Email: [email protected].
منابع مشابه
Partial Garbling Schemes and Their Applications
Garbling schemes (aka randomized encodings of functions) represent a function F by a “simpler” randomized function F̂ such that F̂ (x) reveals F (x) and no additional information about x. Garbling schemes have found applications in many areas of cryptography. Motivated by the goal of improving the efficiency of garbling schemes, we make the following contributions: – We suggest a general new noti...
متن کاملReactive Garbling: Foundation, Instantiation, Application
Garbled circuits is a cryptographic technique, which has been used among other things for the construction of two and threeparty secure computation, private function evaluation and secure outsourcing. Garbling schemes is a primitive which formalizes the syntax and security properties of garbled circuits. We define a generalization of garbling schemes called reactive garbling schemes. We conside...
متن کاملFoundations of Reactive Garbling Schemes
Garbled circuits is a cryptographic technique, which has been used among other things for the construction of two and three-party secure computation, private function evaluation and secure outsourcing. Garbling schemes is a primitive which formalizes the syntax and security properties of garbled circuits. We dene a generalization of garbling schemes called reactive garbling schemes. We conside...
متن کاملAdaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Standard constructions of garbled circuits provide only static security, meaning the input x is not allowed to depend on the garbled circuit F . But some applications—notably one-time programs (Goldwasser, Kalai, and Rothblum 2008) and secure outsourcing (Gennaro, Gentry, Parno 2010)— need adaptive security, where x may depend on F . We identify gaps in proofs from these papers with regard to a...
متن کاملHow to Use Garbling for Privacy Preserving Electronic Surveillance Services
Various applications following the Internet of Things (IoT) paradigm have become a part of our everyday lives. Therefore, designing mechanisms for security, trust and privacy for this context is important. As one example, applications related to electronic surveillance and monitoring have serious issues related to privacy. Research is needed on how to design privacy preserving surveillance syst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014