On Kilian's Randomization of Multilinear Map Encodings

被引:1
作者
Coron, Jean-Sebastien [1 ]
Pereira, Hilder V. L. [1 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II | 2019年 / 11922卷
关键词
FULLY-HOMOMORPHIC-ENCRYPTION; ALGORITHMS; CRYPTANALYSIS;
D O I
10.1007/978-3-030-34621-8_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Indistinguishability obfuscation constructions based on matrix branching programs generally proceed in two steps: first apply Kilian's randomization of the matrix product computation, and then encode the matrices using a multilinear map scheme. In this paper we observe that by applying Kilian's randomization after encoding, the complexity of the best attacks is significantly increased for CLT13 multilinear maps. This implies that much smaller parameters can be used, which improves the efficiency of the constructions by several orders of magnitude. As an application, we describe the first concrete implementation of multiparty non-interactive Diffie-Hellman key exchange secure against existing attacks. Key exchange was originally the most straightforward application of multilinear maps; however it was quickly broken for the three known families ofmultilinearmaps (GGH13, CLT13 and GGH15). Here we describe the first implementation of key exchange that is resistant against known attacks, based on CLT13 multilinear maps. For N = 4 users and a medium level of security, our implementation requires 18 GB of public parameters, and a few minutes for the derivation of a shared key.
引用
收藏
页码:325 / 355
页数:31
相关论文
共 37 条
  • [1] [Anonymous], 1988, P 20 ANN ACM S THEOR
  • [2] [Anonymous], 2014, ACM CCS
  • [3] Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
    Badrinarayanan, Saikrishna
    Miles, Eric
    Sahai, Amit
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 764 - 791
  • [4] Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
  • [5] Barrington D.A., 1986, P 18 ANN ACM S THEOR, P1
  • [6] Becker A., 2016, SODA, P10, DOI 10.1137/1
  • [7] Bernstein D. J., 2003, ALGORITHMIC NUMBER T, V44, P325
  • [8] Boneh D., 2003, Contemporary Mathematics, V324, P71, DOI DOI 10.1090/CONM/324/05731
  • [9] Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
    Boneh, Dan
    Ishai, Yuval
    Sahai, Amit
    Wu, David J.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 247 - 277
  • [10] GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
    Chen, Yilei
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 577 - 607