首页> 外文会议>Annual international cryptology conference >GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
【24h】

GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates

机译:GGH15超越排列分支程序:证明,攻击和候选人

获取原文

摘要

We carry out a systematic study of the GGH15 graded encoding scheme used with general branching programs. This is motivated by the fact that general branching programs are more efficient than permutation branching programs and also substantially more expressive in the read-once setting. Our main results are as follows: 1. Proofs. We present new constructions of private constrained PRFs and lockable obfuscation, for constraints (resp. functions to be obfuscated) that are computable by general branching programs. Our constructions are secure under LWE with subexponential approximation factors. Previous constructions of this kind crucially rely on the permutation structure of the underlying branching programs. Using general branching programs allows us to obtain more efficient constructions for certain classes of constraints (resp. functions), while posing new challenges in the proof, which we overcome using new proof techniques. 2. Attacks. We extend the previous attacks on indistinguishability obfuscation (iO) candidates that use GGH15 encodings. The new attack simply uses the rank of a matrix as the distinguisher, so we call it a "rank attack". The rank attack breaks, among others, the iO candidate for general read-once branching programs by Halevi, Halevi, Shoup and Stephens-Davidowitz (CCS 2017). 3. Candidate Witness Encryption and iO. Drawing upon insights from our proofs and attacks, we present simple candidates for witness encryption and iO that resist the existing attacks, using GGH15 encodings. Our candidate for witness encryption crucially exploits the fact that formulas in conjunctive normal form (CNFs) can be represented by general, read-once branching programs.
机译:我们对与一般分支程序一起使用的GGH15分级编码方案进行了系统的研究。这是由于以下事实:通用分支程序比置换分支程序更有效,并且在一次读取设置中也更具表现力。我们的主要结果如下:1.证明。我们提出了专用约束PRF和可锁定混淆的新构造,以解决可由一般分支程序计算的约束(混淆功能)。在LWE下,我们的构造具有次指数逼近因子,因此是安全的。这种先前的构造至关重要地依赖于基础分支程序的置换结构。使用常规的分支程序可以使我们对某些类别的约束(resp。function)获得更有效的构造,同时在证明中提出新的挑战,而使用新的证明技术可以克服这些挑战。 2.攻击。我们将先前的攻击扩展到使用GGH15编码的不可分辨混淆(iO)候选者。新的攻击只是将矩阵的等级用作区分符,因此我们将其称为“等级攻击”。排名攻击打破了由Halevi,Halevi,Shoup和Stephens-Davidowitz编写的常规一次读取分支程序的iO候选对象(CCS 2017)。 3.候选证人加密和iO。利用我们的证据和攻击的洞察力,我们使用GGH15编码为证人加密和iO提供了简单的候选对象,它们可以抵抗现有的攻击。我们的证人加密候选者至关重要地利用了这样一个事实,即可以用常规的一次读取分支程序表示合取范式(CNF)的公式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号