scispace - formally typeset
Proceedings ArticleDOI

Obfuscating Compute-and-Compare Programs under LWE

Reads0
Chats0
TLDR
The obfuscator satisfies distributional virtual-black-box security, which guarantees that the obfuscated program does not reveal any partial information about the function f or the target value y, as long as they are chosen from some distribution where y has sufficient pseudo-entropy given f.
Abstract
We show how to obfuscate a large and expressive class of programs, which we call compute-and-compare programs, under the learning-with-errors (LWE) assumption. Each such program CC[f,y] is parametrized by an arbitrary polynomial-time computable function f along with a target value y and we define CC[f,y](x) to output 1 if f(x)=y and 0 otherwise. In other words, the program performs an arbitrary {computation} f and then compares its output against a target y. Our obfuscator satisfies distributional virtual-black-box security, which guarantees that the obfuscated program does not reveal any partial information about the function f or the target value y, as long as they are chosen from some distribution where y has sufficient pseudo-entropy given f. We also extend our result to multi-bit compute-and-compare programs MBCC[f,y,z](x) which output a message z if f(x)=y.Compute-and-compare programs are powerful enough to capture many interesting obfuscation tasks as special cases. This includes obfuscating {conjunctions, and therefore we improve on the prior work of Brakerski et al. (ITCS 16) which constructed a conjunction obfuscator under a non-standard entropic ring-LWE assumption, while here we obfuscate a significantly broader class of programs under standard LWE. We show that our obfuscator has several interesting applications. For example, we can take any encryption scheme and publish an obfuscated plaintext equality tester that allows users to check whether a ciphertext decrypts to some target value y; as long as y has sufficient pseudo-entropy this will not harm semantic security. We can also use our obfuscator to generically upgrade attribute-based encryption to predicate encryption with one-sided attribute-hiding security, and to upgrade witness encryption to indistinguishability obfuscation which is secure for all null circuits. Furthermore, we show that our obfuscator gives new circular-security counter-examples for public-key bit encryption and for unbounded length key cycles.Our result uses the graph-induced multi-linear maps of Gentry, Gorbunov and Halevi (TCC 15), but only in a carefully restricted manner which is provably secure under LWE. Our technique is inspired by ideas introduced in a recent work of Goyal, Koppula and Waters (EUROCRYPT 17) in a seemingly unrelated context.

read more

Citations
More filters
Posted Content

Indistinguishability Obfuscation from Well-Founded Assumptions

TL;DR: In this article, the authors show how to construct indistinguishability obfuscation from subexponential hardness of four well-founded assumptions, including the SXDH assumption on asymmetric bilinear groups of a prime order.
Proceedings ArticleDOI

Indistinguishability obfuscation from well-founded assumptions

TL;DR: Barak et al. as discussed by the authors constructed indistinguishability obfuscation from subexponential hardness of four well-founded assumptions, including the Learning Parity with Noise (LPN) assumption over general prime fields ℤp with polynomially many LPN samples and error rate 1/lδ.
Book ChapterDOI

Quantum Lightning Never Strikes the Same State Twice

TL;DR: In this paper, it was shown that either signatures/hash functions/commitment schemes meet very strong recently proposed notions of security, or they yield quantum money or lightning, respectively.
Book ChapterDOI

GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates.

TL;DR: A systematic study of the GGH15 graded encoding scheme used with general branching programs, finding a candidate for witness encryption that exploits the fact that formulas in conjunctive normal form (CNFs) can be represented by general, read-once branching programs.
Proceedings ArticleDOI

Collusion resistant traitor tracing from learning with errors

TL;DR: In this article, a traitor tracing construction with ciphertexts that grow polynomially in log(n) where n is the number of users and prove it secure under the Learning with Errors (LWE) assumption is presented.
References
More filters
Proceedings ArticleDOI

On lattices, learning with errors, random linear codes, and cryptography

TL;DR: A public-key cryptosystem whose hardness is based on the worst-case quantum hardness of SVP and SIVP, and an efficient solution to the learning problem implies a quantum, which can be made classical.
Proceedings ArticleDOI

Trapdoors for hard lattices and new cryptographic constructions

TL;DR: In this article, the authors show how to construct a variety of "trapdoor" cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the shortest nonzero vector to within certain polynomial factors).
Book ChapterDOI

On the (Im)possibility of Obfuscating Programs

TL;DR: It is proved that obfuscation is impossible, by constructing a family of functions F that are inherently unobfuscatable in the following sense: there is a property π : F → {0, 1} such that given any program that computes a function f ∈ F, the value π(f) can be efficiently computed.
Journal ArticleDOI

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

TL;DR: In this article, the authors provide formal definitions and efficient secure techniques for turning noisy information into keys usable for any cryptographic application, and, in particular, reliably and securely authenticating biometric data.
Proceedings ArticleDOI

Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits

TL;DR: In this paper, the authors studied indistinguishability obfuscation and functional encryption for general circuits, and gave constructions for the two schemes that support all polynomial-size circuits.
Related Papers (5)