TY - GEN
T1 - Bootstrapping obfuscators via fast pseudorandom functions
AU - Applebaum, Benny
N1 - Publisher Copyright:
© International Association for Cryptologic Research 2014.
PY - 2014
Y1 - 2014
N2 - We show that it is possible to upgrade an obfuscator for a weak complexity class WEAK into an obfuscator for arbitrary polynomial size circuits, assuming that the class WEAK can compute pseudorandom functions. Specifically, under standard intractability assumptions (e.g., hardness of factoring, Decisional Diffie-Hellman, or Learning with Errors), the existence of obfuscators for NC1 or even TC0 implies the existence of general-purpose obfuscators for P. Previously, such a bootstrapping procedure was known to exist under the assumption that there exists a fully-homomorphic encryption whose decryption algorithm can be computed in WEAK. Our reduction works with respect to virtual black-box obfuscators and relativizes to ideal models.
AB - We show that it is possible to upgrade an obfuscator for a weak complexity class WEAK into an obfuscator for arbitrary polynomial size circuits, assuming that the class WEAK can compute pseudorandom functions. Specifically, under standard intractability assumptions (e.g., hardness of factoring, Decisional Diffie-Hellman, or Learning with Errors), the existence of obfuscators for NC1 or even TC0 implies the existence of general-purpose obfuscators for P. Previously, such a bootstrapping procedure was known to exist under the assumption that there exists a fully-homomorphic encryption whose decryption algorithm can be computed in WEAK. Our reduction works with respect to virtual black-box obfuscators and relativizes to ideal models.
UR - https://www.scopus.com/pages/publications/84916195878
U2 - 10.1007/978-3-662-45608-8_9
DO - 10.1007/978-3-662-45608-8_9
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84916195878
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 162
EP - 172
BT - Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II
A2 - Sarkar, Palash
A2 - Iwata, Tetsu
PB - Springer Verlag
T2 - 20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014
Y2 - 7 December 2014 through 11 December 2014
ER -