Breaking the Sub-Exponential Barrier in Obfustopia

被引:28
|
作者
Garg, Sanjam [1 ]
Pandey, Omkant [2 ]
Srinivasan, Akshayaram [1 ]
Zhandry, Mark [3 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] SUNY Stony Brook, Stony Brook, NY 11794 USA
[3] Princeton Univ, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-319-56617-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Indistinguishability obfuscation (iO) has emerged as a surprisingly powerful notion. Almost all known cryptographic primitives can be constructed from general purpose iO and other minimalistic assumptions such as one-way functions. A major challenge in this direction of research is to develop novel techniques for using iO since iO by itself offers virtually no protection for secret information in the underlying programs. When dealing with complex situations, often these techniques have to consider an exponential number of hybrids (usually one per input) in the security proof. This results in a sub-exponential loss in the security reduction. Unfortunately, this scenario is becoming more and more common and appears to be a fundamental barrier to many current techniques. A parallel research challenge is building obfuscation from simpler assumptions. Unfortunately, it appears that such a construction would likely incur an exponential loss in the security reduction. Thus, achieving any application of iO from simpler assumptions would also require a sub-exponential loss, even if the iO-to-application security proof incurred a polynomial loss. Functional encryption (F epsilon) is known to be equivalent to iO up to a sub-exponential loss in the F epsilon-to-iO security reduction; yet, unlike iO, F epsilon can be achieved from simpler assumptions (namely, specific multilinear map assumptions) with only a polynomial loss. In the interest of basing applications on weaker assumptions, we therefore argue for using F epsilon as the starting point, rather than iO, and restricting to reductions with only a polynomial loss. By significantly expanding on ideas developed by Garg, Pandey, and Srinivasan (CRYPTO 2016), we achieve the following early results in this line of study: We construct universal samplers based only on polynomially-secure public-key FE. As an application of this result, we construct a non-interactive multiparty key exchange (NIKE) protocol for an unbounded number of users without a trusted setup. Prior to this work, such constructions were only known from indistinguishability obfuscation. We also construct trapdoor one-way permutations (OWP) based on polynomially-secure public-key F epsilon. This improves upon the recent result of Bitansky, Paneth, and Wichs (TCC 2016) which requires iO of sub-exponential strength. We proceed in two steps, first giving a construction requiring iO of polynomial strength, and then specializing the F epsilon-to-iO conversion to our specific application. Many of the techniques that have been developed for using iO, including many of those based on the "punctured programming" approach, become inapplicable when we insist on polynomial reductions to F epsilon. As such, our results above require many new ideas that will likely be useful for future works on basing security on F epsilon.
引用
收藏
页码:156 / 181
页数:26
相关论文
共 50 条
  • [41] The Sub-exponential Upper Bound for On-line Chain Partitioning
    Bosek, Bartlomiej
    Krawczyk, Tomasz
    2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 347 - 354
  • [42] Sub-exponential spin-boson decoherence in a finite bath
    Wong, V
    Gruebele, M
    CHEMICAL PHYSICS, 2002, 284 (1-2) : 29 - 44
  • [43] A minimal distal map on the torus with sub-exponential measure complexity
    Huang, Wen
    Xu, Leiye
    Ye, Xiangdong
    ERGODIC THEORY AND DYNAMICAL SYSTEMS, 2020, 40 (04) : 953 - 974
  • [44] A projected discrete Gronwall's inequality with sub-exponential growth
    Zhou, Linfeng
    Zhang, Weinian
    JOURNAL OF DIFFERENCE EQUATIONS AND APPLICATIONS, 2010, 16 (08) : 931 - 943
  • [45] Sub-exponential decay of operator kernels for functions of generalized Schrodinger operators
    Bouclet, JM
    Germinet, F
    Klein, A
    PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY, 2004, 132 (09) : 2703 - 2712
  • [46] Sub-Exponential Decay and Uniform Holomorphic Extensions for Semilinear Pseudodifferential Equations
    Cappiello, Marco
    Gramchev, Todor
    Rodino, Luigi
    COMMUNICATIONS IN PARTIAL DIFFERENTIAL EQUATIONS, 2010, 35 (05) : 846 - 877
  • [47] Improved concentration bounds for sums of independent sub-exponential random variables
    Pinelis, Iosif
    STATISTICS & PROBABILITY LETTERS, 2022, 191
  • [48] Collision Resistant Hashing from Sub-exponential Learning Parity with Noise
    Yu, Yu
    Zhang, Jiang
    Weng, Jian
    Guo, Chun
    Li, Xiangxue
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 3 - 24
  • [49] Sub-exponential Mixing of Open Systems with Particle-Disk Interactions
    Yarmola, Tatiana
    JOURNAL OF STATISTICAL PHYSICS, 2014, 156 (03) : 473 - 492
  • [50] Parameter-Free Online Convex Optimization with Sub-Exponential Noise
    Jun, Kwang-Sung
    Orabona, Francesco
    CONFERENCE ON LEARNING THEORY, VOL 99, 2019, 99