TY - JOUR
T1 - Indistinguishability obfuscation for ram programs and succinct randomized encodings
AU - Bitansky, Nir
AU - Canetti, Ran
AU - Garg, Sanjam
AU - Holmgren, Justin
AU - Jain, Abhishek
AU - Lin, Huijia
AU - Pass, Rafael
AU - Telang, Sidharth
AU - Vaikuntanathan, Vinod
N1 - Publisher Copyright:
© 2018 Society for Industrial and Applied Mathematics.
PY - 2018
Y1 - 2018
N2 - We show how to construct indistinguishability obfuscation (\bfi/bfO) for RAM programs with bounded space, assuming/bfi/bfO for circuits and one-way functions, both with subexponential security. That is, given a RAM program whose computation requires space s(n) in the worst case for inputs of length at most n, we generate an obfuscated RAM program that, for inputs of size at most n, runs in roughly the same time as the original program, using space roughly s(n). The obfuscation process is quasi-linear in the description length of the input program and s(n). At the heart of our construction are succinct randomized encodings for RAM programs. We present two very different constructions of such encodings, each with its own unique properties. Beyond their use as a tool in obfuscation for RAM programs, we show that succinct randomized encodings are interesting objects in their own right. We demonstrate the power of succinct randomized encodings in applications such as publicly verifiable delegation, functional encryption for RAMs, and key-dependent security amplification.
AB - We show how to construct indistinguishability obfuscation (\bfi/bfO) for RAM programs with bounded space, assuming/bfi/bfO for circuits and one-way functions, both with subexponential security. That is, given a RAM program whose computation requires space s(n) in the worst case for inputs of length at most n, we generate an obfuscated RAM program that, for inputs of size at most n, runs in roughly the same time as the original program, using space roughly s(n). The obfuscation process is quasi-linear in the description length of the input program and s(n). At the heart of our construction are succinct randomized encodings for RAM programs. We present two very different constructions of such encodings, each with its own unique properties. Beyond their use as a tool in obfuscation for RAM programs, we show that succinct randomized encodings are interesting objects in their own right. We demonstrate the power of succinct randomized encodings in applications such as publicly verifiable delegation, functional encryption for RAMs, and key-dependent security amplification.
KW - Bootstrapping
KW - Cryptography
KW - Obfuscation
KW - Randomized encodings
UR - http://www.scopus.com/inward/record.url?scp=85049435140&partnerID=8YFLogxK
U2 - 10.1137/15M1050963
DO - 10.1137/15M1050963
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85049435140
SN - 0097-5397
VL - 47
SP - 1123
EP - 1210
JO - SIAM Journal on Computing
JF - SIAM Journal on Computing
IS - 3
ER -