INDISTINGUISHABILITY OBFUSCATION FOR RAM PROGRAMS AND SUCCINCT RANDOMIZED ENCODINGS

被引:15
作者
Bitansky, Nir [1 ,2 ,3 ]
Canetti, Ran [1 ,4 ]
Garg, Sanjam [5 ]
Holmgren, Justin [6 ]
Jain, Abhishek [7 ]
Lin, Huijia [8 ]
Pass, Rafael [9 ]
Telang, Sidharth [9 ]
Vaikuntanathan, Vinod [6 ]
机构
[1] Tel Aviv Univ, Sch Comp Sci, IL-69978 Tel Aviv, Israel
[2] Check Point Inst Informat Secur, Tel Aviv, Israel
[3] IBM Corp, Armonk, NY 10504 USA
[4] Boston Univ, Dept Comp Sci, Boston, MA 02215 USA
[5] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[6] MIT, Dept Elect Engn & Comp Sci, Cambridge, MA 02142 USA
[7] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 21218 USA
[8] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
[9] Cornell Univ, Dept Comp Sci, Ithaca, NY 14853 USA
关键词
cryptography; randomized encodings; obfuscation; bootstrapping; POLYNOMIALS; COMPUTATION;
D O I
10.1137/15M1050963
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show how to construct indistinguishability obfuscation (iO) for RAM programs with bounded space, assuming iO for circuits and one-way functions, both with subexponential security. That is, given a RAM program whose computation requires space s(n) in the worst case for inputs of length at most n, we generate an obfuscated RAM program that, for inputs of size at most n, runs in roughly the same time as the original program, using space roughly s(n). The obfuscation process is quasi-linear in the description length of the input program and s(n). At the heart of our construction are succinct randomized encodings for RAM programs. We present two very different constructions of such encodings, each with its own unique properties. Beyond their use as a tool in obfuscation for RAM programs, we show that succinct randomized encodings are interesting objects in their own right. We demonstrate the power of succinct randomized encodings in applications such as publicly verifiable delegation, functional encryption for RAMs, and key-dependent security amplification.
引用
收藏
页码:1123 / 1210
页数:88
相关论文
共 65 条
[1]  
Ananth P., 2015, IACR CRYPTOLOGY EPRI, V2015, P1023
[2]   Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization [J].
Ananth, Prabhanjan ;
Jain, Abhishek ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 :252-279
[3]   Delegating RAM Computations with Adaptive Soundness and Privacy [J].
Ananth, Prabhanjan ;
Chen, Yu-Chi ;
Chung, Kai-Min ;
Lin, Huijia ;
Lin, Wei-Kai .
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 :3-30
[4]  
[Anonymous], 2012, ITCS, DOI 10.1145/ 2090236.2090263
[5]   Cryptography in NC0 [J].
Applebaum, B ;
Ishai, Y ;
Kushilevitz, E .
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, :166-175
[6]   Computationally private randomizing polynomials and their applications [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
COMPUTATIONAL COMPLEXITY, 2006, 15 (02) :115-162
[7]  
Applebaum B, 2014, LECT NOTES COMPUT SC, V8874, P162, DOI 10.1007/978-3-662-45608-8_9
[8]   How to Garble Arithmetic Circuits [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :120-129
[9]  
Applebaum B, 2011, LECT NOTES COMPUT SC, V6673, P25, DOI 10.1007/978-3-642-20728-0_3
[10]  
Applebaum B, 2011, LECT NOTES COMPUT SC, V6632, P527, DOI 10.1007/978-3-642-20465-4_29