Indistinguishability Obfuscation from Well-Founded Assumptions

被引:126
|
作者
Jain, Aayush [1 ]
Lin, Huijia [2 ]
Sahai, Amit [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
[2] Univ Washington, Seattle, WA 98195 USA
关键词
indistinguishability obfuscation; PSEUDORANDOM GENERATORS;
D O I
10.1145/3406325.3451093
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile programs into unintelligible ones while preserving functionality. It is a fascinating and powerful object that has been shown to enable a host of new cryptographic goals and beyond. However, constructions of indistinguishability obfuscation have remained elusive, with all other proposals relying on heuristics or newly conjectured hardness assumptions. In this work, we show how to construct indistinguishability obfuscation from subexponential hardness of four well-founded assumptions. We prove: Informal Theorem: Let. tau is an element of(0, infinity), delta is an element of(0, 1), epsilon is an element of(0, 1) be arbitrary constants. Assume sub-exponential security of the following assumptions: - the Learning With Errors (LWE) assumption with subexponential modulus-to-noise ratio 2(k epsilon) and noises of magnitude polynomial in k, where k is the dimension of the LWE secret, - the Learning Parity with Noise (LPN) assumption over general prime fields Z(p) with polynomially many LPN samples and error rate 1/l(delta), where l is the dimension of the LPN secret, - the existence of a Boolean Pseudo-Random Generator (PRG) in NC0 with stretch n(1+tau), where n is the length of the PRG seed, - the Decision Linear (DLIN) assumption on symmetric bilinear groups of prime order. Then, (subexponentially secure) indistinguishability obfuscation for all polynomial-size circuits exists. Further, assuming only polynomial security of the aforementioned assumptions, there exists collusion resistant public-key functional encryption for all polynomial-size circuits.
引用
收藏
页码:60 / 73
页数:14
相关论文
共 50 条
  • [41] Hybrid rules with well-founded semantics
    Włodzimierz Drabent
    Jan Małuszyński
    Knowledge and Information Systems, 2010, 25 : 137 - 168
  • [42] AGE 60 RULE WELL-FOUNDED
    BILLINGS, CE
    AVIATION WEEK & SPACE TECHNOLOGY, 1995, 143 (16): : 6 - 6
  • [43] NEOLOGICISM - PHILOSOPHY OF WELL-FOUNDED KNOWLEDGE
    FINN, VK
    VOPROSY FILOSOFII, 1996, (08) : 89 - 99
  • [44] Rank and simulation: the well-founded case
    Gentilini, Raffaella
    Piazza, Carla
    Policriti, Alberto
    JOURNAL OF LOGIC AND COMPUTATION, 2015, 25 (06) : 1331 - 1349
  • [45] Computing the well-founded semantics faster
    Berman, KA
    Schlipf, JS
    Franco, JV
    LOGIC PROGRAMMING AND NONMONOTONIC REASONING, 1995, 928 : 113 - 126
  • [46] On the problem of computing the well-founded semantics
    Lonc, Z
    Truszczynski, M
    COMPUTATIONAL LOGIC - CL 2000, 2000, 1861 : 673 - 687
  • [47] On the problem of computing the well-founded semantics
    Lonc, Z
    Truszczynski, M
    THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2001, 1 : 591 - 609
  • [48] REPRESENTATIONS OF WELL-FOUNDED PREFERENCE ORDERS
    CENZER, D
    MAULDIN, RD
    CANADIAN JOURNAL OF MATHEMATICS-JOURNAL CANADIEN DE MATHEMATIQUES, 1983, 35 (03): : 496 - 508
  • [49] On the Computation of the Disjunctive Well-Founded Semantics
    C. A. Johnson
    Journal of Automated Reasoning, 2001, 26 : 333 - 356
  • [50] Is there a well-founded solution to the generality problem?
    Jonathan D. Matheson
    Philosophical Studies, 2015, 172 : 459 - 468