How to Generate and Use Universal Samplers
Author(s): Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; et al
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr1c55g
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hofheinz, Dennis | - |
dc.contributor.author | Jager, Tibor | - |
dc.contributor.author | Khurana, Dakshita | - |
dc.contributor.author | Sahai, Amit | - |
dc.contributor.author | Waters, Brent | - |
dc.contributor.author | Zhandry, Mark | - |
dc.date.accessioned | 2021-10-08T19:48:11Z | - |
dc.date.available | 2021-10-08T19:48:11Z | - |
dc.date.issued | 2016 | en_US |
dc.identifier.citation | Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry. "How to Generate and Use Universal Samplers." In International Conference on the Theory and Application of Cryptology and Information Security (2016): pp. 715-744. doi:10.1007/978-3-662-53890-6_24 | en_US |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://people.inf.ethz.ch/dhofheinz/pdf/conf/asiacrypt/HofheinzJKSWZ16.pdf | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr1c55g | - |
dc.description.abstract | A random oracle is an idealization that allows us to model a hash function as an oracle that will output a uniformly random string given any input. We introduce the notion of a universal sampler scheme that extends the notion of a random oracle, to a method of sampling securely from arbitrary distributions. We describe several applications that provide a natural motivation for this notion; these include generating the trusted parameters for many schemes from just a single trusted setup. We further demonstrate the versatility of universal samplers by showing how they give rise to simple constructions of identity-based encryption and multiparty key exchange. In particular, we construct adaptively secure non-interactive multiparty key exchange in the random oracle model based on indistinguishability obfuscation; obtaining the first known construction of adaptively secure NIKE without complexity leveraging. We give a solution that shows how to transform any random oracle into a universal sampler scheme, based on indistinguishability obfuscation. At the heart of our construction and proof is a new technique we call “delayed backdoor programming” that we believe will have other applications. | en_US |
dc.format.extent | 715 - 744 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | International Conference on the Theory and Application of Cryptology and Information Security | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | How to Generate and Use Universal Samplers | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | 10.1007/978-3-662-53890-6_24 | - |
dc.identifier.eissn | 1611-3349 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
GenerateUniversalSamplers.pdf | 644.22 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.