首页> 外文会议>International Workshop on Security(IWSEC 2007); 20071029-31; Nara(JP) >A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption
【24h】

A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption

机译:关于使用混淆器将私钥加密转换为公钥加密的(不可能)注释

获取原文
获取原文并翻译 | 示例

摘要

Transforming private-key encryption schemes into public-key encryption schemes is an interesting application of program obfuscation. The idea is that, given a private-key encryption scheme, an obfuscation of an encryption program with a private key embedded is used as a public key and the private key is used for decryption as it is. The security of the resulting public-key encryption scheme would be ensured because obfuscation is unintelligible and the public key is expected to leak no information on the private key. This paper investigates the possibility of general-purpose obfuscators for such a transformation, i.e., obfuscators that can transform an arbitrary private-key encryption scheme into a secure public-key encryption scheme. Barak et al. have shown a negative result, which says that there is a deterministic private-key encryption scheme that is unobfuscatable in the sense that, given any encryption program with a private key embedded, one can efficiently compute the private key. However, it is an open problem whether their result extends to probabilistic encryption schemes, where we should consider a relaxed notion of obfuscators, i.e., sampling obfuscators. Programs obfuscated by sampling obfuscators do not necessarily compute the same function as the original program, but produce the same distribution as the original program. In this paper, we show that there is a probabilistic private-key encryption scheme that can not be transformed into a secure public-key encryption scheme by sampling obfuscators which have a special property regarding input-output dependency of encryption programs. Our intention is not to claim that the required special property is reasonable. Rather, we claim that general-purpose obfuscators for the transformation, if they exist, must be a sampling obfuscator which does NOT have the special property.
机译:将私钥加密方案转换为公钥加密方案是程序混淆的有趣应用。想法是,给定私钥加密方案,将嵌入了私钥的加密程序的混淆用作公钥,并将私钥照原样用于解密。因为混淆是难以理解的,并且期望公钥不泄漏关于私钥的任何信息,所以将确保所得公钥加密方案的安全性。本文研究了通用混淆器进行此类转换的可能性,即可以将任意私钥加密方案转换为安全公钥加密方案的混淆器。巴拉克等。已经显示出否定的结果,这表明存在确定性的私钥加密方案,因为在给定任何嵌入了私钥的加密程序的情况下,可以有效地计算私钥,因此这种确定性是难以理解的。但是,它们的结果是否扩展到概率加密方案是一个未解决的问题,在该方案中,我们应该考虑宽松的混淆器概念,即采样混淆器。被采样混淆器混淆的程序不一定要计算与原始程序相同的功能,但是会产生与原始程序相同的分布。在本文中,我们表明存在一种概率性私钥加密方案,该方案无法通过对具有加密程序的输入输出依存关系的特殊属性的混淆器进行采样,而无法转换为安全的公钥加密方案。我们的意图不是要求所要求的特殊财产合理。相反,我们声称用于转换的通用混淆器(如果存在)必须是不具有特殊属性的采样混淆器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号