Homomorphic Indistinguishability Obfuscation and Its Applications

Authors Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran



PDF
Thumbnail PDF

File

LIPIcs.ITCS.2024.14.pdf
  • Filesize: 0.76 MB
  • 21 pages

Document Identifiers

Author Details

Kaartik Bhushan
  • IIT Bombay, India
Venkata Koppula
  • IIT Delhi, India
Manoj Prabhakaran
  • IIT Bombay, India

Cite AsGet BibTex

Kaartik Bhushan, Venkata Koppula, and Manoj Prabhakaran. Homomorphic Indistinguishability Obfuscation and Its Applications. In 15th Innovations in Theoretical Computer Science Conference (ITCS 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 287, pp. 14:1-14:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.ITCS.2024.14

Abstract

In this work, we propose the notion of homomorphic indistinguishability obfuscation (HiO) and present a construction based on subexponentially-secure iO and one-way functions. An HiO scheme allows us to convert an obfuscation of circuit C to an obfuscation of C'∘C, and this can be performed obliviously (that is, without knowing the circuit C). A naïve solution would be to obfuscate C'∘iO(C). However, if we do this for k hops, then the size of the final obfuscation is exponential in k. HiO ensures that the size of the final obfuscation remains polynomial after repeated compositions. As an application, we show how to build function-hiding hierarchical multi-input functional encryption and homomorphic witness encryption using HiO.

Subject Classification

ACM Subject Classification
  • Theory of computation → Computational complexity and cryptography
Keywords
  • Program Obfuscation
  • Homomorphisms

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Prabhanjan Ananth, Aloni Cohen, and Abhishek Jain. Cryptography with updates. In Advances in Cryptology - EUROCRYPT 2017, pages 445-472, 2017. Google Scholar
  2. Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, and Anna Lysyanskaya. Fully homomorphic nizk and niwi proofs. In Theory of Cryptography, 2019. Google Scholar
  3. Prabhanjan Ananth and Abhishek Jain. Indistinguishability obfuscation from compact functional encryption. Cryptology ePrint Archive, Report 2015/173, 2015. Google Scholar
  4. Prabhanjan Ananth, Abhishek Jain, and Amit Sahai. Indistinguishability obfuscation for turing machines: Constant overhead and amortization. In Advances in Cryptology - CRYPTO 2017, 2017. Google Scholar
  5. Prabhanjan Ananth, Abhishek Jain, and Amit Sahai. Patchable indistinguishability obfuscation: io for evolving software. In Advances in Cryptology - EUROCRYPT 2017, pages 127-155, 2017. Google Scholar
  6. Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, 2012. Google Scholar
  7. Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, and Sidharth Telang. Succinct randomized encodings and their applications. In Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing, STOC '15, 2015. Google Scholar
  8. Nir Bitansky, Omer Paneth, and Alon Rosen. On the cryptographic hardness of finding a nash equilibrium. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 2015. Google Scholar
  9. Nir Bitansky and Vinod Vaikuntanathan. Indistinguishability obfuscation from functional encryption. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pages 171-190, 2015. Google Scholar
  10. Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, and Stefano Tessaro. Foundations of homomorphic secret sharing. Cryptology ePrint Archive, Paper 2017/1248, 2017. Google Scholar
  11. Zvika Brakerski and Gil Segev. Function-private functional encryption in the private-key setting. In Theory of Cryptography, 2015. Google Scholar
  12. Zvika Brakerski and Gil Segev. Hierarchical functional encryption. Cryptology ePrint Archive, Paper 2015/1011, 2015. Google Scholar
  13. Ran Canetti and Justin Holmgren. Fully succinct garbled ram. In Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, ITCS '16, 2016. Google Scholar
  14. Ran Canetti, Justin Holmgren, Abhishek Jain, and Vinod Vaikuntanathan. Succinct garbling and indistinguishability obfuscation for ram programs. In Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing, STOC '15, 2015. Google Scholar
  15. Ran Canetti, Huijia Lin, Stefano Tessaro, and Vinod Vaikuntanathan. Obfuscation of probabilistic circuits and applications. Cryptology ePrint Archive, Report 2014/882, 2014. Google Scholar
  16. Wutichai Chongchitmate and Rafail Ostrovsky. Circuit-private multi-key fhe. Cryptology ePrint Archive, Paper 2017/010, 2017. Google Scholar
  17. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. Candidate indistinguishability obfuscation and functional encryption for all circuits. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, 2013. Google Scholar
  18. Sanjam Garg, Craig Gentry, Amit Sahai, and Brent Waters. Witness encryption and its applications. In Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013, STOC '13, pages 467-476, 2013. Google Scholar
  19. Sanjam Garg and Omkant Pandey. Incremental program obfuscation. In Advances in Cryptology - CRYPTO 2017, pages 193-223, 2017. Google Scholar
  20. Craig Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC '09, pages 169-178, 2009. Google Scholar
  21. Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. i-hop homomorphic encryption and rerandomizable yao circuits. In Advances in Cryptology - CRYPTO 2010, 2010. Google Scholar
  22. Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou. Multi-input functional encryption. In Advances in Cryptology - EUROCRYPT 2014, 2014. Google Scholar
  23. Sergey Gorbunov, Vinod Vaikuntanathan, and Daniel Wichs. Leveled fully homomorphic signatures from standard lattices. In Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing, STOC '15, 2015. Google Scholar
  24. Aayush Jain, Huijia Lin, and Ji Luo. On the optimal succinctness and efficiency of functional encryption and attribute-based encryption. In Advances in Cryptology - EUROCRYPT 2023, 2023. Google Scholar
  25. Venkata Koppula, Allison Bishop Lewko, and Brent Waters. Indistinguishability obfuscation for turing machines with unbounded memory. In Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing, STOC '15, pages 419-428, 2015. Google Scholar
  26. R L Rivest, L Adleman, and M L Dertouzos. On data banks and privacy homomorphisms. Foundations of Secure Computation, Academia Press, pages 169-179, 1978. Google Scholar
  27. Amit Sahai and Brent Waters. How to use indistinguishability obfuscation: Deniable encryption, and more. In Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing, STOC '14, pages 475-484, 2014. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail