【24h】

Bootstrapping Obfuscators via Fast Pseudorandom Functions

机译:通过快速伪随机函数自动启动混淆器

获取原文

摘要

We show that it is possible to upgrade an obfuscator for a weak complexity class WEAK into an obfuscator for arbitrary polynomial size circuits, assuming that the class WEAK can compute pseudorandom functions. Specifically, under standard intractability assumptions (e.g., hardness of factoring, Decisional Diffie-Hellman, or Learning with Errors), the existence of obfuscators for NC~1 or even TC~0 implies the existence of general-purpose obfuscators for P. Previously, such a bootstrapping procedure was known to exist under the assumption that there exists a, fully-homomorphic encryption whose decryption algorithm can be computed in WEAK. Our reduction works with respect to virtual black-box obfuscators and relativizes to ideal models.
机译:我们表明,假设类弱可以计算伪随机函数,可以将弱复杂性类弱进入弱复杂性等级弱进入任意多项式电路的混淆器。具体地,在标准的难识性假设下(例如,考虑的硬度,决定性差异 - Hellman或使用错误学习),NC〜1甚至Tc〜0的混淆器的存在意味着P.之前的通用混淆器的存在意味着,已知在假设中存在这样的引导程序,即存在解密算法可以在弱的中计算的完全同态加密。我们的减少适用于虚拟黑匣子混淆器并将其依赖于理想模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号