Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption

被引:9
|
作者
Ananth, Prabhanjan [1 ]
Jain, Aayush [1 ]
Sahai, Amit [2 ,3 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Ctr Encrypted Funct, Los Angeles, CA 90024 USA
[2] Univ Calif Los Angeles, Los Angeles, CA USA
[3] Ctr Encrypted Funct, Los Angeles, CA USA
关键词
NONINTERACTIVE ZERO-KNOWLEDGE; INTEGERS;
D O I
10.1007/978-3-319-56620-7_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Indistinguishability Obfuscation (iO) has enabled an incredible number of new and exciting applications. However, our understanding of how to actually build secure iO remains in its infancy. While many candidate constructions have been published, some have been broken, and it is unclear which of the remaining candidates are secure. This work deals with the following basic question: Can we hedge our bets when it comes to iO candidates? In other words, if we have a collection of iO candidates, and we only know that at least one of them is secure, can we still make use of these candidates? This topic was recently studied by Ananth, Jain, Naor, Sahai, and Yogev [CRYPTO 2016], who showed how to construct a robust iO combiner: Specifically, they showed that given the situation above, we can construct a single iO scheme that is secure as long as (1) at least one candidate iO scheme is a subexponentially secure iO, and (2) either the subexponential DDH or LWE assumptions hold. In this work, we make three contributions: -(Better robust iO combiners.) First, we work to improve the assumptions needed to obtain the same result as Ananth et al.: namely we show how to replace the DDH/LWE assumption with the assumption that subexponentially secure one-way functions exist. -(Transforming Combiners from iO to FE and NIKE.) Second, we consider a broader question: what if we start with several iO candidates where only one works, but we don't care about achieving iO itself, rather we want to achieve concrete applications of iO? In this case, we are able to work with the minimal assumption of just polynomially secure one-way functions, and where the working iO candidate only achieves polynomial security. We call such combiners transforming combiners. More generally, a transforming combiner from primitive A to primitive B is one that takes as input many candidates of primitive A, out of which we are guaranteed that at least one is secure and outputs a secure candidate of primitive B. We can correspondingly define robust transforming combiners. We present transforming combiners from indistinguishability obfuscation to functional encryption and non-interactive multiparty key exchance (NIKE). -(Correctness Amplification for iO from polynomial security and one-way functions.) Finally, along the way, we obtain a result of independent interest: Recently, Bitansky and Vaikuntanathan [TCC 2016] showed how to amplify the correctness of an iO scheme, but they needed subexponential security for the iO scheme and also require subexponentially secure DDH or LWE. We show how to achieve the same correctness amplification result, but requiring only polynomial security from the iO scheme, and assuming only polynomially secure one-way functions.
引用
收藏
页码:91 / 121
页数:31
相关论文
共 50 条
  • [1] Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
    Ananth, Prabhanjan
    Jain, Aayush
    Naor, Moni
    Sahai, Amit
    Yogev, Eylon
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 491 - 520
  • [2] Indistinguishability Obfuscation from Functional Encryption
    Bitansky, Nir
    Vaikuntanathan, Vinod
    [J]. 2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2015, : 171 - 190
  • [3] Indistinguishability Obfuscation from Functional Encryption
    Bitansky, Nir
    Vaikuntanathan, Vinod
    [J]. JOURNAL OF THE ACM, 2018, 65 (06)
  • [4] Indistinguishability Obfuscation from Compact Functional Encryption
    Ananth, Prabhanjan
    Jain, Abhishek
    [J]. ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 308 - 326
  • [5] LIMITS ON THE POWER OF INDISTINGUISHABILITY OBFUSCATION AND FUNCTIONAL ENCRYPTION
    Asharov, Gilad
    Segev, Gil
    [J]. SIAM JOURNAL ON COMPUTING, 2016, 45 (06) : 2117 - 2176
  • [6] Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
    Asharov, Gilad
    Segev, Gil
    [J]. 2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2015, : 191 - 209
  • [7] CANDIDATE INDISTINGUISHABILITY OBFUSCATION AND FUNCTIONAL ENCRYPTION FOR ALL CIRCUITS
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Raykova, Mariana
    Sahai, Amit
    Waters, Brent
    [J]. SIAM JOURNAL ON COMPUTING, 2016, 45 (03) : 882 - 929
  • [8] Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
    Arriaga, Afonso
    Barbosa, Manuel
    Farshim, Pooya
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 227 - 247
  • [9] Functional Signatures from Indistinguishability Obfuscation
    Wang, Li
    Li, Hongda
    Tang, Fei
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 213 - 227
  • [10] Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits (Extended Abstract)
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Raykova, Mariana
    Sahai, Amit
    Waters, Brent
    [J]. 2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2013, : 40 - 49