A Note on Perfect Correctness by Derandomization

Nir Bitansky*, Vinod Vaikuntanathan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. The transformation works for schemes that are correct on all inputs with probability noticeably larger than half, and are secure under parallel repetition. We assume the existence of one-way functions and of functions with deterministic (uniform) time complexity 2 O(n) and non-deterministic circuit complexity 2 Ω(n). Our transformation complements previous results that showed how public-key encryption and indistinguishability obfuscation that err on a noticeable fraction of inputs can be turned into ones that for all inputs are often correct, showing that they can be made perfectly correct. The technique relies on the idea of “reverse randomization” [Naor, Crypto 1989] and on Nisan–Wigderson style derandomization, previously used in cryptography to remove interaction from witness-indistinguishable proofs and commitment schemes [Barak, Ong and Vadhan, Crypto 2003].

Original languageEnglish
Article number18
JournalJournal of Cryptology
Volume35
Issue number3
DOIs
StatePublished - Jul 2022

Fingerprint

Dive into the research topics of 'A Note on Perfect Correctness by Derandomization'. Together they form a unique fingerprint.

Cite this