On Constructing One-Way Permutations from Indistinguishability Obfuscation

被引:14
作者
Asharov, Gilad [1 ]
Segev, Gil [1 ]
机构
[1] Hebrew Univ Jerusalem, IL-91904 Jerusalem, Israel
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II | 2016年 / 9563卷
关键词
SECURE HASH FUNCTIONS; FINDING COLLISIONS; IMPOSSIBILITY; BOUNDS;
D O I
10.1007/978-3-662-49099-0_19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We prove that there is no black-box construction of a one-way permutation family from a one-way function and an indistinguishability obfuscator for the class of all oracle-aided circuits, where the construction is "domain invariant" (i.e., where each permutation may have its own domain, but these domains are independent of the underlying building blocks). Following the framework of Asharov and Segev (FOCS '15), by considering indistinguishability obfuscation for oracle-aided circuits we capture the common techniques that have been used so far in constructions based on indistinguishability obfuscation. These include, in particular, non-black-box techniques such as the punctured programming approach of Sahai and Waters (STOC '14) and its variants, as well as sub-exponential security assumptions. For example, we fully capture the construction of a trapdoor permutation family from a one-way function and an indistinguishability obfuscator due to Bitansky, Paneth and Wichs (TCC '16). Their construction is not domain invariant and our result shows that this, somewhat undesirable property, is unavoidable using the common techniques. In fact, we observe that constructions which are not domain invariant circumvent all known negative results for constructing one-way permutations based on one-way functions, starting with Rudich's seminal work (PhD thesis '88). We revisit this classic and fundamental problem, and resolve this somewhat surprising gap by ruling out all such black-box constructions - even those that are not domain invariant.
引用
收藏
页码:512 / 541
页数:30
相关论文
共 60 条
[1]   From Selective to Adaptive Security in Functional Encryption [J].
Ananth, Prabhanjan ;
Brakerski, Zvika ;
Segev, Gil ;
Vaikuntanathan, Vinod .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :657-677
[2]   Indistinguishability Obfuscation from Compact Functional Encryption [J].
Ananth, Prabhanjan ;
Jain, Abhishek .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :308-326
[3]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[4]  
Asharov G., 2015, 2015752 CRYPT EPRINT, V2015
[5]  
Asharov G., 2015, P 56 ANN IE IN PRESS
[6]  
Baecher P, 2013, LECT NOTES COMPUT SC, V8269, P296, DOI 10.1007/978-3-642-42033-7_16
[7]   On the (Im)possibility of Obfuscating Programs [J].
Barak, Boaz ;
Goldreich, Oded ;
Impagliazzo, Russell ;
Rudich, Steven ;
Sahai, Amit ;
Vadhan, Salil ;
Yang, Ke .
JOURNAL OF THE ACM, 2012, 59 (02)
[8]  
Barak B, 2009, LECT NOTES COMPUT SC, V5677, P374, DOI 10.1007/978-3-642-03356-8_22
[9]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8874, P102, DOI 10.1007/978-3-662-45608-8_6
[10]  
Bitansky N., 2015, P 56 ANN IE IN PRESS