Perfect Structure on the Edge of Chaos Trapdoor Permutations from Indistinguishability Obfuscation

被引:37
作者
Bitansky, Nir [1 ]
Paneth, Omer [2 ]
Wichs, Daniel [3 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] Boston Univ, Boston, MA 02215 USA
[3] Northeastern Univ, Boston, MA 02115 USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I | 2016年 / 9562卷
关键词
D O I
10.1007/978-3-662-49096-9_20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct trapdoor permutations based on (subexponential) indistinguishability obfuscation and one-way functions, thereby providing the first candidate that is not based on the hardness of factoring. Our construction shows that even highly structured primitives, such as trapdoor permutations, can be potentially based on hardness assumptions with noisy structures such as those used in candidate constructions of indistinguishability obfuscation. It also suggest a possible way to construct trapdoor permutations that resist quantum attacks, and that their hardness may be based on problems outside the complexity class SZK indeed, while factoring-based candidates do not possess such security, future constructions of indistinguishability obfuscation might. As a corollary, we eliminate the need to assume trapdoor permutations and injective one-way function in many recent constructions based on indistinguishability obfuscation.
引用
收藏
页码:474 / 502
页数:29
相关论文
共 40 条
  • [1] Algorithmic Barriers from Phase Transitions
    Achlioptas, Dimitris
    Coja-Oghlan, Amin
    [J]. PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 793 - +
  • [2] Ananth P., 2015, CRYPTO
  • [3] [Anonymous], 2015, FOCS
  • [4] [Anonymous], 2014882 CRYPT EPRINT
  • [5] [Anonymous], 1982, 23 ANN S FDN COMP SC
  • [6] [Anonymous], 1983, COMMUN ACM, DOI DOI 10.1145/357980.358017
  • [7] [Anonymous], 1981, ADV CRYPT IEEE WORKS
  • [8] [Anonymous], 1988, ADV CRYPTOLOGY CRYPT, DOI DOI 10.1007/0-387-34799-2_5
  • [9] Applebaum B, 2015, LECT NOTES COMPUT SC, V9015, P528, DOI 10.1007/978-3-662-46497-7_21
  • [10] Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1