Affiliation:
1. Tel Aviv University, Tel Aviv, Israel
2. MIT, Cambridge MA, USA
Abstract
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. Prior candidate IO constructions were based on specific assumptions on algebraic objects called multi-linear graded encodings.
We present a generic construction of indistinguishability obfuscation from public-key functional encryption with succinct encryption circuits and subexponential security. This shows the equivalence of indistinguishability obfuscation and public-key functional encryption, a primitive that has previously seemed to be much weaker, lacking the power and the staggering range of applications of indistinguishability obfuscation.
Our main construction can be based on functional encryption schemes that support a
single functional key
, and where the encryption circuit grows sub-linearly in the circuit-size of the function. We further show that sublinear succinctness in circuit-size for single-key schemes can be traded with sublinear succinctness in the number of keys (also known as the
collusion-size
) for multi-key schemes. We also show that, under the Learning with Errors assumption, our techniques imply that any indistinguishability obfuscator can be converted into one where the size of obfuscated circuits is twice that of the original circuit plus an additive overhead that is polynomial in its depth, input length, and the security parameter.
Funder
NEC Corporation
Defense Advanced Research Projects Agency
Steven and Renee Finn Career Development Chair from MIT
NSF
U.S. Army Research Office
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Time-Lock Puzzles from Lattices;Lecture Notes in Computer Science;2024
2. Quantum attribute-based encryption: a comprehensive study;Quantum Information Processing;2023-09-03
3. Unbounded Predicate Inner Product Functional Encryption from Pairings;Journal of Cryptology;2023-06-13
4. FENet;Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics;2023-04-24
5. Structure-Preserving Compilers from New Notions of Obfuscations;Lecture Notes in Computer Science;2023