To refer to this page use:
http://arks.princeton.edu/ark:/88435/pr1wz6s
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhandry, Mark | - |
dc.date.accessioned | 2021-10-08T19:48:21Z | - |
dc.date.available | 2021-10-08T19:48:21Z | - |
dc.date.issued | 2016 | en_US |
dc.identifier.citation | Zhandry, Mark. "The Magic of ELFs." In Annual International Cryptology Conference (2016): pp. 479-508. doi:10.1007/978-3-662-53018-4_18 | en_US |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://www.cs.princeton.edu/~mzhandry/docs/papers/ELFs.pdf | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr1wz6s | - |
dc.description.abstract | We introduce the notion of an Extremely Lossy Function (ELF). An ELF is a family of functions with an image size that is tunable anywhere from injective to having a polynomial-sized image. Moreover, for any efficient adversary, for a sufficiently large polynomial r (necessarily chosen to be larger than the running time of the adversary), the adversary cannot distinguish the injective case from the case of image size r. We develop a handful of techniques for using ELFs, and show that such extreme lossiness is useful for instantiating random oracles in several settings. In particular, we show how to use ELFs to build secure point function obfuscation with auxiliary input, as well as polynomially-many hardcore bits for any one-way function. Such applications were previously known from strong knowledge assumptions — for example polynomially-many hardcore bits were only know from differing inputs obfuscation, a notion whose plausibility has been seriously challenged. We also use ELFs to build a simple hash function with output intractability, a new notion we define that may be useful for generating common reference strings. Next, we give a construction of ELFs relying on the exponential hardness of the decisional Diffie-Hellman problem, which is plausible in pairing-based groups. Combining with the applications above, our work gives several practical constructions relying on qualitatively different — and arguably better — assumptions than prior works. | en_US |
dc.format.extent | 479 - 508 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | Annual International Cryptology Conference | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | The Magic of ELFs | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | 10.1007/978-3-662-53018-4_18 | - |
dc.identifier.eissn | 1611-3349 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
MagicOfElfsConference.pdf | 792 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.