On Constructing One-Way Permutations from Indistinguishability Obfuscation

被引:14
|
作者
Asharov, Gilad [1 ]
Segev, Gil [1 ]
机构
[1] Hebrew Univ Jerusalem, IL-91904 Jerusalem, Israel
来源
关键词
SECURE HASH FUNCTIONS; FINDING COLLISIONS; IMPOSSIBILITY; BOUNDS;
D O I
10.1007/978-3-662-49099-0_19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We prove that there is no black-box construction of a one-way permutation family from a one-way function and an indistinguishability obfuscator for the class of all oracle-aided circuits, where the construction is "domain invariant" (i.e., where each permutation may have its own domain, but these domains are independent of the underlying building blocks). Following the framework of Asharov and Segev (FOCS '15), by considering indistinguishability obfuscation for oracle-aided circuits we capture the common techniques that have been used so far in constructions based on indistinguishability obfuscation. These include, in particular, non-black-box techniques such as the punctured programming approach of Sahai and Waters (STOC '14) and its variants, as well as sub-exponential security assumptions. For example, we fully capture the construction of a trapdoor permutation family from a one-way function and an indistinguishability obfuscator due to Bitansky, Paneth and Wichs (TCC '16). Their construction is not domain invariant and our result shows that this, somewhat undesirable property, is unavoidable using the common techniques. In fact, we observe that constructions which are not domain invariant circumvent all known negative results for constructing one-way permutations based on one-way functions, starting with Rudich's seminal work (PhD thesis '88). We revisit this classic and fundamental problem, and resolve this somewhat surprising gap by ruling out all such black-box constructions - even those that are not domain invariant.
引用
收藏
页码:512 / 541
页数:30
相关论文
共 50 条
  • [31] One-way permutations, interactive hashing and statistically hiding commitments
    Wee, Hoeteck
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 419 - 433
  • [32] The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives
    Yan-Cheng Chang
    Chun-Yuan Hsiao
    Chi-Jen Lu
    Journal of Cryptology, 2006, 19 : 97 - 114
  • [33] Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions
    Haitner, Iftach
    Reingold, Omer
    Vadhan, Salil
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 437 - 446
  • [34] EFFICIENCY IMPROVEMENTS IN CONSTRUCTING PSEUDORANDOM GENERATORS FROM ONE-WAY FUNCTIONS
    Haitner, Iftach
    Reingold, Omer
    Vadhan, Salil
    SIAM JOURNAL ON COMPUTING, 2013, 42 (03) : 1405 - 1430
  • [35] Indistinguishability Obfuscation from Circular Security
    Gay, Romain
    Pass, Rafael
    STOC '21: PROCEEDINGS OF THE 53RD ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2021, : 736 - 749
  • [36] Functional Signatures from Indistinguishability Obfuscation
    Wang, Li
    Li, Hongda
    Tang, Fei
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 213 - 227
  • [37] Indistinguishability Obfuscation: From Approximate to Exact
    Bitansky, Nir
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 67 - 95
  • [38] Indistinguishability Obfuscation from Functional Encryption
    Bitansky, Nir
    Vaikuntanathan, Vinod
    2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2015, : 171 - 190
  • [39] Indistinguishability Obfuscation from Functional Encryption
    Bitansky, Nir
    Vaikuntanathan, Vinod
    JOURNAL OF THE ACM, 2018, 65 (06)
  • [40] METHODS OF CONSTRUCTING ONE-WAY AND FACTORIAL DESIGNS BALANCED FOR TREND
    PHILLIPS, JP
    THE ROYAL STATISTICAL SOCIETY SERIES C-APPLIED STATISTICS, 1968, 17 (02): : 162 - &