74 research outputs found
Indistinguishability Obfuscation from Well-Founded Assumptions
In this work, we show how to construct indistinguishability obfuscation from
subexponential hardness of four well-founded assumptions. We prove:
Let be arbitrary
constants. Assume sub-exponential security of the following assumptions, where
is a security parameter, and the parameters below are
large enough polynomials in :
- The SXDH assumption on asymmetric bilinear groups of a prime order ,
- The LWE assumption over with subexponential
modulus-to-noise ratio , where is the dimension of the LWE
secret,
- The LPN assumption over with polynomially many LPN samples
and error rate , where is the dimension of the LPN
secret,
- The existence of a Boolean PRG in with stretch
,
Then, (subexponentially secure) indistinguishability obfuscation for all
polynomial-size circuits exists
Constant-Round Concurrent Zero-Knowledge From Falsifiable Assumptions
We present a constant-round concurrent zero-knowledge protocol for \NP. Our protocol is sound against uniform polynomial-time attackers, and relies on the existence of families of collision-resistant hash functions, and a new (but in our eyes, natural) falsifiable intractability assumption: Roughly speaking, that Micali's non-interactive CS-proofs are sound for languages in
New Insights into Multi-Calibration
We identify a novel connection between the recent literature on multi-group
fairness for prediction algorithms and well-established notions of graph
regularity from extremal graph theory. We frame our investigation using new,
statistical distance-based variants of multi-calibration that are closely
related to the concept of outcome indistinguishability. Adopting this
perspective leads us naturally not only to our graph theoretic results, but
also to new multi-calibration algorithms with improved complexity in certain
parameter regimes, and to a generalization of a state-of-the-art result on
omniprediction. Along the way, we also unify several prior algorithms for
achieving multi-group fairness, as well as their analyses, through the lens of
no-regret learning
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings
All constructions of general purpose indistinguishability obfuscation (IO) rely on either meta-assumptions that encapsulate an exponential family of assumptions (e.g., Pass, Seth and Telang, CRYPTO 2014 and Lin, EUROCRYPT 2016), or polynomial families of assumptions on graded encoding schemes with a high polynomial degree/multilinearity (e.g., Gentry, Lewko, Sahai and Waters, FOCS 2014).
We present a new construction of IO, with a security reduction based on two assumptions: (a) a DDH-like assumption — called the joint-SXDH assumption — on constant degree graded en- codings, and (b) the existence of polynomial-stretch pseudorandom generators (PRG) in NC0. Our assumption on graded encodings is simple, has constant size, and does not require handling composite-order rings. This narrows the gap between the mathematical objects that exist (bilinear maps, from elliptic curve groups) and ones that suffice to construct general purpose indistinguishability obfuscation
Succinct and Adaptively Secure ABE for ABP from k-Lin
We present *succinct* and *adaptively secure* attribute-based encryption (ABE)
schemes for *arithmetic branching programs*, based on k-Lin in pairing groups.
Our key-policy ABE scheme has ciphertexts of *constant size*, independent of
the length of the attributes, and our ciphertext-policy ABE scheme has secret
keys of *constant size*. Our schemes improve upon the recent succinct ABE
schemes in [Attrapadung and Tomida, Asiacrypt \u2720], which only handle Boolean
formulae. All other prior succinct ABE schemes either achieve only selective
security or rely on -type assumptions.
Our schemes are obtained through a general and modular approach that combines
a public-key inner-product functional encryption satisfying a new security
notion called gradual simulation security and an information-theoretic
randomized encoding scheme called arithmetic key garbling scheme
Multiparty Reusable Non-Interactive Secure Computation
Reducing interaction in Multiparty Computation (MPC) is a highly desirable goal in cryptography. It is known that 2-round MPC can be based on the minimal assumption of 2-round Oblivious Transfer (OT) [Benhamouda and Lin, Garg and Srinivasan, EC 2018], and 1-round MPC is impossible in general. In this work, we propose a natural ``hybrid\u27\u27 model, called \textbf{multiparty reusable Non-Interactive Secure Computation Market (mrNISC)}. In this model, parties publish encodings of their private inputs at the beginning, once and for all. Later, any subset of them can compute \emph{on-the-fly} a function on their inputs by just sending a single message to a stateless evaluator, conveying the result and nothing else. Importantly, the input encodings can be \emph{reused} in any number of on-the-fly computations, and the same classical simulation security guaranteed by multi-round MPC, is achieved. In short, mrNISC has minimal yet ``tractable\u27\u27 interaction pattern.
We initiate the study of mrNISC on several fronts. First, we formalize the security of mrNISC protocols in both a UC definition and a game-based definition. Second, we construct mrNISC protocols in the plain model with semi-honest and semi-malicious security based on bilinear groups. Third, we demonstrate the power of mrNISC by showing two applications: non-interactive MPC (NIMPC) with reusable setup and a distributed version of program obfuscation. In addition, at the core of our construction of mrNISC is a witness encryption scheme for a special language that verifies Non-Interactive Zero-Knowledge (NIZK) proofs of the validity of computations over committed values, which we believe is of independent interest
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
We introduce Pseudo Flawed-smudging Generators (PFGs). A PFG is an expanding function whose outputs satisfy a weak form of pseudo-randomness. Roughly speaking, for some polynomial bound , and every distribution over -bounded noise vectors, it guarantees that the distribution of is indistinguishable from that of , where is a random sample from , and is another independent sample from conditioned on agreeing with at a few, , coordinates. In other words, hides at all but a few coordinates. We show that assuming LWE and the existence of constant-locality Pseudo-Random Generators (PRGs), there is a construction of IO from 1) a PFG that has polynomial stretch and polynomially bounded outputs, and 2) a Functional Encryption (FE) scheme able to compute this PFG. Such FE can be built from degree multilinear map if the PFG is computable by a degree polynomial.
Toward basing IO on bilinear maps, inspired by [Ananth et. al. Eprint 2018], we further consider PFGs with partial pubic input --- they have the form and satisfy the aforementioned pseudo flawed-smudging property even when is public. When using such PFGs, it suffices to replace FE with a weaker notion of partially hiding FE (PHFE) whose decryption reveals the public input in addition to the output of the computation. We construct PHFE for polynomials that are quadratic in the private input , but have up to polynomial degree in the public input , subject to certain size constraints, from the SXDH assumption over bilinear map groups.
Regarding candidates of PFGs with partial public input, we note that the family of cubic polynomials proposed by Ananth et. al. can serve as candidate PFGs, and can be evaluated by our PHFE from bilinear maps. Toward having more candidates, we present a transformation for converting the private input of a constant-degree PFG into a public input, by hiding as noises in LWE samples, provided that is sampled from a LWE noise distribution and satisfies a stronger security property
Two-Round MPC without Round Collapsing Revisited -- Towards Efficient Malicious Protocols
Recent works have made exciting progress on the construction of round optimal, *two-round*, Multi-Party Computation (MPC) protocols. However, most proposals so far are still complex and inefficient.
In this work, we improve the simplicity and efficiency of two-round MPC in the setting with dishonest majority and malicious security. Our protocols make use of the Random Oracle (RO) and a generalization of the Oblivious Linear Evaluation (OLE) correlated randomness, called tensor OLE, over a finite field , and achieve the following:
- MPC for Boolean Circuits: Our two-round, maliciously secure MPC protocols for computing Boolean circuits, has overall (asymptotic) computational cost , where is the size of the circuit computed, the number of parties, and a field of characteristic two. The protocols also make black-box calls to a Pseudo-Random Function (PRF).
- MPC for Arithmetic Branching Programs (ABPs): Our two-round, information theoretically and maliciously secure protocols for computing ABPs over a general field has overall computational cost , where is the size of ABP computed.
Both protocols achieve security levels inverse proportional to the size of the field .
Our construction is built upon the simple two-round MPC protocols of [Lin-Liu-Wee TCC\u2720], which are only semi-honest secure. Our main technical contribution lies in ensuring malicious security using simple and lightweight checks, which incur only a constant overhead over the complexity of the protocols by Lin, Liu, and Wee.
In particular, in the case of computing Boolean circuits, our malicious MPC protocols have the same complexity (up to a constant overhead) as (insecurely) computing Yao\u27s garbled circuits in a distributed fashion.
Finally, as an additional contribution, we show how to efficiently generate tensor OLE correlation in fields of characteristic two using OT
Succinct Garbling Schemes and Applications
Assuming the existence of iO for P/poly and one-way functions, we show how to succinctly garble bounded-space computations (BSC) M: the size of the garbled program (as well as the time needed to generate the garbling) only depends on the size and space (including the input and output) complexity of M, but not its running time. The key conceptual insight behind this construction is a method for using iO to compress a computation that can be performed piecemeal, without revealing anything about it.
As corollaries of our succinct garbling scheme, we demonstrate the following:
-functional encryption for BSC from iO for P/poly and one-way functions;
-reusable succinct garbling schemes for BSC from iO for P/poly and one-way functions;
- succinct iO for BSC from sub-exponentially-secure iO for P/poly and sub-exponentially secure one-way functions;
- (PerfectNIZK) SNARGS for bounded space and witness NP from sub-exponentially-secure iO for P/poly and sub-exponentially-secure one-way functions.
Previously such primitives were only know to exists based on “knowledge-based” assumptions (such as SNARKs and/or differing-input obfuscation).
We finally demonstrate the first (non-succinct) iO for RAM programs with bounded input and output lengths, that has poly-logarithmic overhead, based on the existence of sub-exponentially-secure iO for P/poly and sub-exponentially-secure one-way functions
k-Round MPC from k-Round OT via Garbled Interactive Circuits
We present new constructions of round-efficient, or even round-optimal, Multi-Party Computation (MPC) protocols from Oblivious Transfer (OT) protocols. Our constructions establish a tight connection between MPC and OT: In the setting of semi-honest security, for any , -round semi-honest OT is necessary and complete for -round semi-honest MPC. In the round-optimal case of , we obtain 2-round semi-honest MPC from 2-round semi-honest OT, resolving the round complexity of semi-honest MPC assuming weak and necessary assumption. In comparison, previous 2-round constructions rely on either the heavy machinery of indistinguishability obfuscation or witness encryption, or the algebraic structure of bilinear pairing groups. More generally, for an arbitrary number of rounds , all previous constructions of -round semi-honest MPC require at least OT with rounds for .
In the setting of malicious security, we show: For any , -round malicious OT is necessary and complete for -round malicious MPC. In fact, OT satisfying a weaker notion of delayed-semi-malicious security suffices. In the common reference string model, for any , we obtain -round malicious Universal Composable (UC) protocols from any -round semi-malicious OT and non-interactive zero-knowledge. Previous 5-round protocols in the plain model, and 2-round protocols in the common reference string model all require algebraic assumptions such as DDH or LWE.
At the core of our constructions is a new framework for garbling interactive circuits. Roughly speaking, it allows for garbling interactive machines that participates in interactions of a special form. The garbled machine can emulate the original interactions receiving messages sent in the clear (without being encoded using secrets), and reveals only the transcript of the interactions, provided that the transcript is computationally uniquely defined. We show that garbled interactive circuits for the purpose of constructing MPC can be implemented using OT. Along the way, we also propose a new primitive of witness selector that strengthens witness encryption, and a new notion of zero-knowledge functional commitments
- …