Breaking the Sub-Exponential Barrier in Obfustopia
Author(s): Garg, Sanjam; Pandey, Omkant; Srinivasan, Akshayaram; Zhandry, Mark
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr1mp1x
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Garg, Sanjam | - |
dc.contributor.author | Pandey, Omkant | - |
dc.contributor.author | Srinivasan, Akshayaram | - |
dc.contributor.author | Zhandry, Mark | - |
dc.date.accessioned | 2021-10-08T19:48:10Z | - |
dc.date.available | 2021-10-08T19:48:10Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.citation | Garg, Sanjam, Omkant Pandey, Akshayaram Srinivasan, and Mark Zhandry. "Breaking the Sub-Exponential Barrier in Obfustopia." In Annual International Conference on the Theory and Applications of Cryptographic Techniques (2017): pp. 156-181. doi:10.1007/978-3-319-56617-7_6 | en_US |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://www.cs.princeton.edu/~mzhandry/docs/papers/FEApps.pdf | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr1mp1x | - |
dc.description.abstract | Indistinguishability obfuscation ( πξ» ) has emerged as a surprisingly powerful notion. Almost all known cryptographic primitives can be constructed from general purpose πξ» and other minimalistic assumptions such as one-way functions. A major challenge in this direction of research is to develop novel techniques for using πξ» since πξ» by itself offers virtually no protection for secret information in the underlying programs. When dealing with complex situations, often these techniques have to consider an exponential number of hybrids (usually one per input) in the security proof. This results in a sub-exponential loss in the security reduction. Unfortunately, this scenario is becoming more and more common and appears to be a fundamental barrier to many current techniques. A parallel research challenge is building obfuscation from simpler assumptions. Unfortunately, it appears that such a construction would likely incur an exponential loss in the security reduction. Thus, achieving any application of πξ» from simpler assumptions would also require a sub-exponential loss, even if the πξ» -to-application security proof incurred a polynomial loss. Functional encryption ( ξ²ξ± ) is known to be equivalent to πξ» up to a sub-exponential loss in the ξ²ξ± -to- πξ» security reduction; yet, unlike πξ» , ξ²ξ± can be achieved from simpler assumptions (namely, specific multilinear map assumptions) with only a polynomial loss. In the interest of basing applications on weaker assumptions, we therefore argue for using ξ²ξ± as the starting point, rather than πξ» , and restricting to reductions with only a polynomial loss. By significantly expanding on ideas developed by Garg, Pandey, and Srinivasan (CRYPTO 2016), we achieve the following early results in this line of study: We construct universal samplers based only on polynomially-secure public-key ξ²ξ± . As an application of this result, we construct a non-interactive multiparty key exchange (NIKE) protocol for an unbounded number of users without a trusted setup. Prior to this work, such constructions were only known from indistinguishability obfuscation. We also construct trapdoor one-way permutations (OWP) based on polynomially-secure public-key ξ²ξ± . This improves upon the recent result of Bitansky, Paneth, and Wichs (TCC 2016) which requires πξ» of sub-exponential strength. We proceed in two steps, first giving a construction requiring πξ» of polynomial strength, and then specializing the ξ²ξ± -to- πξ» conversion to our specific application. Many of the techniques that have been developed for using πξ» , including many of those based on the βpunctured programmingβ approach, become inapplicable when we insist on polynomial reductions to ξ²ξ± . As such, our results above require many new ideas that will likely be useful for future works on basing security on ξ²ξ± . | en_US |
dc.format.extent | 156 - 181 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | Annual International Conference on the Theory and Applications of Cryptographic Techniques | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | Breaking the Sub-Exponential Barrier in Obfustopia | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | 10.1007/978-3-319-56617-7_6 | - |
dc.identifier.eissn | 1611-3349 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
BreakingSubExponentialBarrierObfustopia.pdf | 588.93 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.