How to Use Indistinguishability Obfuscation: Deniable Encryption, and More

被引:371
作者
Sahai, Amit [1 ]
Waters, Brent [2 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
来源
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING | 2014年
关键词
Obfuscation; Encryption;
D O I
10.1145/2591796.2591825
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic problems. We use this technique to carry out a systematic study of the applicability of indistinguishability obfuscation to a variety of cryptographic goals. Along the way, we resolve the 16-year-old open question of Deniable Encryption, posed by Canetti, Dwork, Naor, and Ostrovsky in 1997: In deniable encryption, a sender who is forced to reveal to an adversary both her message and the randomness she used for encrypting it should be able to convincingly provide "fake" randomness that can explain any alternative message that she would like to pretend that she sent. We resolve this question by giving the first construction of deniable encryption that does not require any pre-planning by the party that must later issue a denial. In addition, we show the generality of our punctured programs technique by also constructing a variety of core cryptographic objects from indistinguishability obfuscation and one-way functions (or close variants). In particular we obtain: public key encryption, short "hash-and-sign" selectively secure signatures, chosen-ciphertext secure public key encryption, non-interactive zero knowledge proofs (NIZKs), injective trapdoor functions, and oblivious transfer. These results suggest the possibility of indistinguishability obfuscation becoming a "central hub" for cryptography.
引用
收藏
页码:475 / 484
页数:10
相关论文
共 22 条
  • [1] [Anonymous], 2001, FDN CRYPTOGRAPHY BAS
  • [2] [Anonymous], 2012, ITCS 2012
  • [3] [Anonymous], IACR CRYPTOLOGY EPRI
  • [4] [Anonymous], 2013, 2013128 CRYPT EPRINT
  • [5] [Anonymous], 2013401 IACR CRYPT E
  • [6] Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
  • [7] On the (Im)possibility of Obfuscating Programs
    Barak, Boaz
    Goldreich, Oded
    Impagliazzo, Russell
    Rudich, Steven
    Sahai, Amit
    Vadhan, Salil
    Yang, Ke
    [J]. JOURNAL OF THE ACM, 2012, 59 (02)
  • [8] Brakerski Z., 2011, CRYPTO
  • [9] Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
    Brakerski, Zvika
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 868 - 886
  • [10] CANETTI R, 1997, CRYPTO, V1294, P90