TY - JOUR
T1 - A Note on Perfect Correctness by Derandomization
AU - Bitansky, Nir
AU - Vaikuntanathan, Vinod
N1 - Publisher Copyright:
© 2022, The Author(s).
PY - 2022/7
Y1 - 2022/7
N2 - We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. The transformation works for schemes that are correct on all inputs with probability noticeably larger than half, and are secure under parallel repetition. We assume the existence of one-way functions and of functions with deterministic (uniform) time complexity 2 O(n) and non-deterministic circuit complexity 2 Ω(n). Our transformation complements previous results that showed how public-key encryption and indistinguishability obfuscation that err on a noticeable fraction of inputs can be turned into ones that for all inputs are often correct, showing that they can be made perfectly correct. The technique relies on the idea of “reverse randomization” [Naor, Crypto 1989] and on Nisan–Wigderson style derandomization, previously used in cryptography to remove interaction from witness-indistinguishable proofs and commitment schemes [Barak, Ong and Vadhan, Crypto 2003].
AB - We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. The transformation works for schemes that are correct on all inputs with probability noticeably larger than half, and are secure under parallel repetition. We assume the existence of one-way functions and of functions with deterministic (uniform) time complexity 2 O(n) and non-deterministic circuit complexity 2 Ω(n). Our transformation complements previous results that showed how public-key encryption and indistinguishability obfuscation that err on a noticeable fraction of inputs can be turned into ones that for all inputs are often correct, showing that they can be made perfectly correct. The technique relies on the idea of “reverse randomization” [Naor, Crypto 1989] and on Nisan–Wigderson style derandomization, previously used in cryptography to remove interaction from witness-indistinguishable proofs and commitment schemes [Barak, Ong and Vadhan, Crypto 2003].
UR - http://www.scopus.com/inward/record.url?scp=85130089920&partnerID=8YFLogxK
U2 - 10.1007/s00145-022-09428-0
DO - 10.1007/s00145-022-09428-0
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85130089920
SN - 0933-2790
VL - 35
JO - Journal of Cryptology
JF - Journal of Cryptology
IS - 3
M1 - 18
ER -