Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification

28Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The existence of secure indistinguishability obfuscators (Formula Presented) has far-reaching implications, significantly expanding the scope of problems amenable to cryptographic study. All known approaches to constructing (Formula Presented) rely on d-linear maps. While secure bilinear maps are well established in cryptographic literature, the security of candidates for (Formula Presented) is poorly understood. We propose a new approach to constructing (Formula Presented) for general circuits. Unlike all previously known realizations of (Formula Presented), we avoid the use of d-linear maps of degree (Formula Presented). At the heart of our approach is the assumption that a new weak pseudorandom object exists. We consider two related variants of these objects, which we call perturbation resilient generator ((Formula Presented) RG) and pseudo flawed-smudging generator ((Formula Presented)), respectively. At a high level, both objects are polynomially expanding functions whose outputs partially hide (or smudge) small noise vectors when added to them. We further require that they are computable by a family of degree-3 polynomials over (Formula Presented). We show how they can be used to construct functional encryption schemes with weak security guarantees. Finally, we use novel amplification techniques to obtain full security. As a result, we obtain (Formula Presented) for general circuits assuming: Subexponentially secure LWEBilinear Maps(Formula Presented) -secure 3-block-local PRGs(Formula Presented) RGs or (Formula Presented) s

References Powered by Scopus

On lattices, learning with errors, random linear codes, and cryptography

1774Citations
N/AReaders
Get full text

(Leveled) fully homomorphic encryption without bootstrapping

1274Citations
N/AReaders
Get full text

Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based

1070Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Indistinguishability obfuscation from well-founded assumptions

155Citations
N/AReaders
Get full text

Candidate io from homomorphic encryption schemes

29Citations
N/AReaders
Get full text

Candidate Witness Encryption from Lattice Techniques

24Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Ananth, P., Jain, A., Lin, H., Matt, C., & Sahai, A. (2019). Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11694 LNCS, pp. 284–332). Springer Verlag. https://doi.org/10.1007/978-3-030-26954-8_10

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

78%

Researcher 2

22%

Readers' Discipline

Tooltip

Computer Science 7

88%

Physics and Astronomy 1

13%

Save time finding and organizing research with Mendeley

Sign up for free