Obfuscating Conjunctions under Entropic Ring LWE

We show how to securely obfuscate conjunctions, which are functions f(x[subscript 1], . . . , x[subscript n]) = ∧[subscript i∈I] y[superscript i] where I ⊆ [n] and each literal y[subscript i] is either just x[subscript i] or ¬x[subscript i] e.g., f(x[subscript 1], . . . , x_n) = x[subscript 1] ⊆ ¬ x...

Full description

Bibliographic Details
Main Authors: Brakerski, Zvika (Author), Vaikuntanathan, Vinod (Contributor), Wee, Hoeteck (Author), Wichs, Daniel (Author)
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor)
Format: Article
Language:English
Published: Association for Computing Machinery, 2017-12-29T19:18:44Z.
Subjects:
Online Access:Get fulltext
LEADER 02040 am a22002053u 4500
001 112985
042 |a dc 
100 1 0 |a Brakerski, Zvika  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science  |e contributor 
100 1 0 |a Vaikuntanathan, Vinod  |e contributor 
700 1 0 |a Vaikuntanathan, Vinod  |e author 
700 1 0 |a Wee, Hoeteck  |e author 
700 1 0 |a Wichs, Daniel  |e author 
245 0 0 |a Obfuscating Conjunctions under Entropic Ring LWE 
260 |b Association for Computing Machinery,   |c 2017-12-29T19:18:44Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/112985 
520 |a We show how to securely obfuscate conjunctions, which are functions f(x[subscript 1], . . . , x[subscript n]) = ∧[subscript i∈I] y[superscript i] where I ⊆ [n] and each literal y[subscript i] is either just x[subscript i] or ¬x[subscript i] e.g., f(x[subscript 1], . . . , x_n) = x[subscript 1] ⊆ ¬ x[subscript 3] ⊆ ¬ x[subscript 7] · · · ⊆ x[subscript n−1]. Whereas prior work of Brakerski and Rothblum (CRYPTO 2013) showed how to achieve this using a non-standard object called cryptographic multilinear maps, our scheme is based on an "entropic" variant of the Ring Learning with Errors (Ring LWE) assumption. As our core tool, we prove that hardness assumptions on the recent multilinear map construction of Gentry, Gorbunov and Halevi (TCC 2015) can be established based on entropic Ring LWE. We view this as a first step towards proving the security of additional multilinear map based constructions, and in particular program obfuscators, under standard assumptions. Our scheme satisfies virtual black box (VBB) security, meaning that the obfuscated program reveals nothing more than black-box access to f as an oracle, at least as long as (essentially) the conjunction is chosen from a distribution having sufficient entropy. 
546 |a en_US 
655 7 |a Article 
773 |t Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science - ITCS '16