Notes On GGH13 Without The Presence Of Ideals
نویسندگان
چکیده
We investigate the merits of altering the Garg, Gentry and Halevi (GGH13) graded encoding scheme to remove the presence of the ideal 〈g〉. In particular, we show that we can alter the form of encodings so that effectively a new gi is used for each source group Gi, while retaining correctness. This would appear to prevent all known attacks on indistinguishability obfuscation (IO) candidates instantiated using GGH13. However, when analysing security in simplified branching program and obfuscation security models, we present branching program (and thus IO) distinguishing attacks that do not use knowledge of 〈g〉. This result opens a counterpoint with the work of Halevi (EPRINT 2015) which stated that the core computational hardness problem underpinning GGH13 is computing a basis of this ideal. Our attempts seem to suggest that there is a structural vulnerability in the way that GGH13 encodings are constructed that lies deeper than the presence of 〈g〉.
منابع مشابه
Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals
Recently, Albrecht, Davidson and Larraia described a variant of the GGH13 without ideals and presented the distinguishing attacks in simplified branching program security model. Their result partially demonstrates that there seems to be a structural defect in the GGH13 encoding that is not related to the ideal 〈g〉. However, it is not clear whether a variant of the CGH attack described by Chen, ...
متن کاملSome notes on the characterization of two dimensional skew cyclic codes
A natural generalization of two dimensional cyclic code ($T{TDC}$) is two dimensional skew cyclic code. It is well-known that there is a correspondence between two dimensional skew cyclic codes and left ideals of the quotient ring $R_n:=F[x,y;rho,theta]/_l$. In this paper we characterize the left ideals of the ring $R_n$ with two methods and find the generator matrix for two dimensional s...
متن کاملGraded Encoding, Variations on a Scheme
In this note we provide a more-or-less unified framework to talk about the functionality and security of graded encoding schemes, describe some variations of recent schemes, and discuss their security. In particular we describe schemes that combine elements from both the GGH13 scheme of Garg, Gentry and Halevi (EUROCRYPT 2013) and the GGH15 scheme of Gentry, Gorbunov and Halevi (TCC 2015). On o...
متن کاملNew multilinear maps from ideal lattices
Recently, Hu and Jia presented an efficient attack on the GGH13 map. They show that the MPKE and WE based on GGH13 with public tools of encoding are not secure. Currently, an open problem is to fix GGH13 with functionality-preserving. By modifying zero-testing parameter and using switching modulus method, we present a new construction of multilinear map from ideal lattices. Our construction mai...
متن کاملMappings to Realcompactifications
In this paper, we introduce and study a mapping from the collection of all intermediate rings of $C(X)$ to the collection of all realcompactifications of $X$ contained in $beta X$. By establishing the relations between this mapping and its converse, we give a different approach to the main statements of De et. al. Using these, we provide different answers to the four basic questions...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017