Obfuscation of Probabilistic Circuits and Applications

© International Association for Cryptologic Research 2015. This paper studies the question of how to define, construct, and use obfuscators for probabilistic programs. Such obfuscators compil a possibly randomized program into a deterministic one, which achieves computationally indistinguishable beh...

Full description

Bibliographic Details
Main Authors: Ananth, Prabhanjan (Author), Brakerski, Zvika (Author), Segev, Gil (Author), Vaikuntananthan, Vinod (Author)
Format: Article
Language:English
Published: Springer Nature America, Inc, 2021-11-18T13:54:13Z.
Subjects:
Online Access:Get fulltext
LEADER 02467 am a22001813u 4500
001 138151
042 |a dc 
100 1 0 |a Ananth, Prabhanjan  |e author 
700 1 0 |a Brakerski, Zvika  |e author 
700 1 0 |a Segev, Gil  |e author 
700 1 0 |a Vaikuntananthan, Vinod  |e author 
245 0 0 |a Obfuscation of Probabilistic Circuits and Applications 
260 |b Springer Nature America, Inc,   |c 2021-11-18T13:54:13Z. 
856 |z Get fulltext  |u https://hdl.handle.net/1721.1/138151 
520 |a © International Association for Cryptologic Research 2015. This paper studies the question of how to define, construct, and use obfuscators for probabilistic programs. Such obfuscators compil a possibly randomized program into a deterministic one, which achieves computationally indistinguishable behavior from the original program as long as it is run on each input at most once. For obfuscation, we propose a notion that extends indistinguishability obfuscation to probabilistic circuits: It should be hard to distinguish between the obfuscations of any two circuits whose output distributions at each input are computationally indistinguishable, possibly in presence of some auxiliary input. We call the resulting notion probabilistic indistinguishability obfuscation (pIO). We define several variants of pIO, and study relations among them. Moreover, we give a construction of one of our variants, called X-pIO, from sub-exponentially hard indistinguishability obfuscation (for deterministic circuits) and one-way functions. We then move on to show a number of applications of pIO. In particular, we first give a general and natural methodology to achieve fully homomorphic encryption (FHE) from variants of pIO and of semantically secure encryption schemes. In particular, one instantiation leads to FHE from any X-pIO obfuscator and any re-randomizable encryption scheme that's slightly super-polynomially secure. We note that this constitutes the first construction of full-fledged FHE that does not rely on encryption with circular security. Moreover, assuming sub-exponentially secure puncturable PRFs computable in NC1, sub-exponentially-secure indistinguishability obfuscation for (deterministic) NC1 circuits can be bootstrapped to obtain indistinguishability obfuscation for arbitrary (deterministic) poly-size circuits (previously such bootstrapping was known only assuming FHE with NC1 decryption algorithm). 
546 |a en 
655 7 |a Article 
773 |t 10.1007/978-3-662-46497-7_19