Indistinguishability Obfuscation from Compact Functional Encryption

被引:136
作者
Ananth, Prabhanjan [1 ]
Jain, Abhishek [2 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA USA
[2] Johns Hopkins Univ, Baltimore, MD 21218 USA
来源
ADVANCES IN CRYPTOLOGY, PT I | 2015年 / 9215卷
基金
美国国家科学基金会;
关键词
RANDOMIZING POLYNOMIALS;
D O I
10.1007/978-3-662-47989-6_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic landscape by enabling several security goals that were previously beyond our reach. Consequently, one of the pressing goals currently is to construct iO from well-studied standard cryptographic assumptions. In this work, we make progress in this direction by presenting a reduction from iO to a natural form of public-key functional encryption (FE). Specifically, we construct iO for general functions from any single-key FE scheme for NC1 that achieves selective, indistinguishability security against sub-exponential time adversaries. Further, the FE scheme should be compact, namely, the running time of the encryption algorithm must only be a polynomial in the security parameter and the input message length (and not in the function description size or its output length). We achieve this result by developing a novel arity amplification technique to transform FE for single-ary functions into FE for multi-ary functions (aka multi-input FE). Instantiating our approach with known, non-compact FE schemes, we obtain the first constructions of multi-input FE for constant-ary functions based on standard assumptions. Finally, as a result of independent interest, we construct a compact FE scheme from randomized encodings for Turing machines and learning with errors assumption.
引用
收藏
页码:308 / 326
页数:19
相关论文
共 47 条
  • [1] Agrawal S., 2013, 2013744 IACR CRYPT E
  • [2] Agrawal S, 2013, LECT NOTES COMPUT SC, V8043, P500, DOI 10.1007/978-3-642-40084-1_28
  • [3] Ananth P., 2015, 2015173 CRYPT EPRINT
  • [4] Ananth P., 2014, 2014917 IACR CRYPT E
  • [5] Ananth Prabhanjan, 2013, IACR Cryptol. ePrint Arch., P689
  • [6] [Anonymous], 2014666 IACR CRYPT E
  • [7] [Anonymous], LNCS
  • [8] [Anonymous], 2015, STOC
  • [9] Computationally private randomizing polynomials and their applications
    Applebaum, Benny
    Ishai, Yuval
    Kushilevitz, Eyal
    [J]. COMPUTATIONAL COMPLEXITY, 2006, 15 (02) : 115 - 162
  • [10] Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1