On Constructing One-Way Permutations from Indistinguishability Obfuscation

被引:14
|
作者
Asharov, Gilad [1 ]
Segev, Gil [1 ]
机构
[1] Hebrew Univ Jerusalem, IL-91904 Jerusalem, Israel
来源
关键词
SECURE HASH FUNCTIONS; FINDING COLLISIONS; IMPOSSIBILITY; BOUNDS;
D O I
10.1007/978-3-662-49099-0_19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We prove that there is no black-box construction of a one-way permutation family from a one-way function and an indistinguishability obfuscator for the class of all oracle-aided circuits, where the construction is "domain invariant" (i.e., where each permutation may have its own domain, but these domains are independent of the underlying building blocks). Following the framework of Asharov and Segev (FOCS '15), by considering indistinguishability obfuscation for oracle-aided circuits we capture the common techniques that have been used so far in constructions based on indistinguishability obfuscation. These include, in particular, non-black-box techniques such as the punctured programming approach of Sahai and Waters (STOC '14) and its variants, as well as sub-exponential security assumptions. For example, we fully capture the construction of a trapdoor permutation family from a one-way function and an indistinguishability obfuscator due to Bitansky, Paneth and Wichs (TCC '16). Their construction is not domain invariant and our result shows that this, somewhat undesirable property, is unavoidable using the common techniques. In fact, we observe that constructions which are not domain invariant circumvent all known negative results for constructing one-way permutations based on one-way functions, starting with Rudich's seminal work (PhD thesis '88). We revisit this classic and fundamental problem, and resolve this somewhat surprising gap by ruling out all such black-box constructions - even those that are not domain invariant.
引用
收藏
页码:512 / 541
页数:30
相关论文
共 50 条
  • [21] On sets with easy certificates and the existence of one-way permutations
    Hemaspaandra, LA
    Rothe, J
    Wechsung, G
    ALGORITHMS AND COMPLEXITY, 1997, 1203 : 264 - 275
  • [22] One-way permutations and self-witnessing languages
    Homan, CM
    Thakur, M
    FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 243 - 254
  • [23] On constructing parallel pseudorandom generators from one-way functions
    Viola, E
    TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2005, : 183 - 197
  • [24] On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations
    Matsuda, Takahiro
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 265 - 290
  • [25] Tag-KEM from Set Partial Domain One-Way Permutations
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kurosawa, Kaoru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 42 - 52
  • [26] Tag-KEM from set partial domain one-way permutations
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kurosawa, Kaoru
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 360 - 370
  • [27] On small set of one-way LOCC indistinguishability of maximally entangled states
    Yan-Ling Wang
    Mao-Sheng Li
    Zhu-Jun Zheng
    Shao-Ming Fei
    Quantum Information Processing, 2016, 15 : 1661 - 1668
  • [28] On small set of one-way LOCC indistinguishability of maximally entangled states
    Wang, Yan-Ling
    Li, Mao-Sheng
    Zheng, Zhu-Jun
    Fei, Shao-Ming
    QUANTUM INFORMATION PROCESSING, 2016, 15 (04) : 1661 - 1668
  • [29] The impossibility of basing one-way permutations on central cryptographic primitives
    Chang, YC
    Hsiao, CY
    Lu, CJ
    JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 97 - 114
  • [30] On the impossibilities of basing one-way permutations on central cryptographic primitives
    Chang, YC
    Hsiao, CY
    Lu, CJ
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 110 - 124