Skip to main content

New Techniques for Obfuscating Conjunctions

Author(s): Bartusek, James; Lepoint, Tancrède; Ma, Fermi; Zhandry, Mark

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1kn83
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBartusek, James-
dc.contributor.authorLepoint, Tancrède-
dc.contributor.authorMa, Fermi-
dc.contributor.authorZhandry, Mark-
dc.date.accessioned2021-10-08T19:48:14Z-
dc.date.available2021-10-08T19:48:14Z-
dc.date.issued2019en_US
dc.identifier.citationBartusek, James, Tancrède Lepoint, Fermi Ma, and Mark Zhandry. "New Techniques for Obfuscating Conjunctions." In Annual International Conference on the Theory and Applications of Cryptographic Techniques (2019): pp. 636-666. doi:10.1007/978-3-030-17659-4_22en_US
dc.identifier.issn0302-9743-
dc.identifier.urihttps://www.cs.princeton.edu/~mzhandry/docs/papers/ObfConj.pdf-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1kn83-
dc.description.abstractA conjunction is a function 𝑓(π‘₯1,…,π‘₯𝑛)=β‹€π‘–βˆˆπ‘†π‘™π‘– where π‘†βŠ†[𝑛] and each 𝑙𝑖 is π‘₯𝑖 or Β¬π‘₯𝑖 . Bishop et al. (CRYPTO 2018) recently proposed obfuscating conjunctions by embedding them in the error positions of a noisy Reed-Solomon codeword and placing the codeword in a group exponent. They prove distributional virtual black box (VBB) security in the generic group model for random conjunctions where |𝑆|β‰₯0.226𝑛 . While conjunction obfuscation is known from LWE [31, 47], these constructions rely on substantial technical machinery. In this work, we conduct an extensive study of simple conjunction obfuscation techniques. We abstract the Bishop et al. scheme to obtain an equivalent yet more efficient β€œdual” scheme that can handle conjunctions over exponential size alphabets. This scheme admits a straightforward proof of generic group security, which we combine with a novel combinatorial argument to obtain distributional VBB security for |S| of any size. If we replace the Reed-Solomon code with a random binary linear code, we can prove security from standard LPN and avoid encoding in a group. This addresses an open problem posed by Bishop et al. to prove security of this simple approach in the standard model. We give a new construction that achieves information theoretic distributional VBB security and weak functionality preservation for |𝑆|β‰₯π‘›βˆ’π‘›π›Ώ and 𝛿<1 . Assuming discrete log and 𝛿<1/2 , we satisfy a stronger notion of functionality preservation for computationally bounded adversaries while still achieving information theoretic security.en_US
dc.format.extent636 - 666en_US
dc.language.isoen_USen_US
dc.relation.ispartofAnnual International Conference on the Theory and Applications of Cryptographic Techniquesen_US
dc.rightsAuthor's manuscripten_US
dc.titleNew Techniques for Obfuscating Conjunctionsen_US
dc.typeConference Articleen_US
dc.identifier.doi10.1007/978-3-030-17659-4_22-
dc.identifier.eissn1611-3349-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceedingen_US

Files in This Item:
File Description SizeFormat 
NewTechniquesObfuscatingConjunctions.pdf633.25 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.