Skip to main content

Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness

Author(s): Liu, Qipeng; Zhandry, Mark

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1jh3d28n
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, Qipeng-
dc.contributor.authorZhandry, Mark-
dc.date.accessioned2023-12-23T22:45:09Z-
dc.date.available2023-12-23T22:45:09Z-
dc.date.issued2021en_US
dc.identifier.citationLiu, Qipeng, and Mark Zhandry. "Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness." Journal of Cryptology 34, no. 3 (2021). doi:10.1007/s00145-021-09400-4en_US
dc.identifier.issn0933-2790-
dc.identifier.urihttps://eprint.iacr.org/eprint-bin/getfile.pl?entry=2017/209&version=20170301:001947&file=209.pdf-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1jh3d28n-
dc.description.abstractThere is some evidence that indistinguishability obfuscation (iO) requires either exponentially many assumptions or (sub)exponentially hard assumptions, and indeed, all known ways of building obfuscation suffer one of these two limitations. As such, any application built from iO suffers from these limitations as well. However, for most applications, such limitations do not appear to be inherent to the application, just the approach using iO. Indeed, several recent works have shown how to base applications of iO instead on functional encryption (FE), which can in turn be based on the polynomial hardness of just a few assumptions. However, these constructions are quite complicated and recycle a lot of similar techniques. In this work, we unify the results of previous works in the form of a weakened notion of obfuscation, called decomposable obfuscation. We show (1) how to build decomposable obfuscation from functional encryption and (2) how to build a variety of applications from decomposable obfuscation, including all of the applications already known from FE. The construction in (1) hides most of the difficult techniques in the prior work, whereas the constructions in (2) are much closer to the comparatively simple constructions from iO. As such, decomposable obfuscation represents a convenient new platform for obtaining more applications from polynomial hardness.en_US
dc.language.isoen_USen_US
dc.relation.ispartofJournal of Cryptologyen_US
dc.rightsAuthor's manuscripten_US
dc.titleDecomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardnessen_US
dc.typeJournal Articleen_US
dc.identifier.doi10.1007/s00145-021-09400-4-
dc.identifier.eissn1432-1378-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
ObfuscationPolyHardness.pdf628.77 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.