Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation

Author(s):  
Shweta Agrawal
2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Huige Wang ◽  
Kefei Chen ◽  
Tianyu Pan ◽  
Yunlei Zhao

Functional encryption (FE) can implement fine-grained control to encrypted plaintext via permitting users to compute only some specified functions on the encrypted plaintext using private keys with respect to those functions. Recently, many FEs were put forward; nonetheless, most of them cannot resist chosen-ciphertext attacks (CCAs), especially for those in the secret-key settings. This changed with the work, i.e., a generic transformation of public-key functional encryption (PK-FE) from chosen-plaintext (CPA) to chosen-ciphertext (CCA), where the underlying schemes are required to have some special properties such as restricted delegation or verifiability features. However, examples for such underlying schemes with these features have not been found so far. Later, a CCA-secure functional encryption from projective hash functions was proposed, but their scheme only applies to inner product functions. To construct such a scheme, some nontrivial techniques will be needed. Our key contribution in this work is to propose CCA-secure functional encryptions in the PKE and SK environment, respectively. In the existing generic transformation from (adaptively) simulation-based CPA- (SIM-CPA-) secure ones for deterministic functions to (adaptively) simulation-based CCA- (SIM-CCA-) secure ones for randomized functions, whether the schemes were directly applied to CCA settings for deterministic functions is not implied. We give an affirmative answer and derive a SIM-CCA-secure scheme for deterministic functions by making some modifications on it. Again, based on this derived scheme, we also propose an (adaptively) indistinguishable CCA- (IND-CCA-) secure SK-FE for deterministic functions. The final results show that our scheme can be instantiated under both nonstandard assumptions (e.g., hard problems on multilinear maps and indistinguishability obfuscation (IO)) and under standard assumptions (e.g., DDH, RSA, LWE, and LPN).


2020 ◽  
Vol 14 (1) ◽  
pp. 5-14
Author(s):  
Dan Boneh ◽  
Darren Glass ◽  
Daniel Krashen ◽  
Kristin Lauter ◽  
Shahed Sharif ◽  
...  

AbstractWe describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be difficult. We do not obtain a working protocol because of a missing step that is currently an open mathematical problem. What we need to complete our protocol is an efficient algorithm that takes as input an abelian variety presented as a product of isogenous elliptic curves, and outputs an isomorphism invariant of the abelian variety.Our framework builds a cryptographic invariant map, which is a new primitive closely related to a cryptographic multilinear map, but whose range does not necessarily have a group structure. Nevertheless, we show that a cryptographic invariant map can be used to build several cryptographic primitives, including NIKE, that were previously constructed from multilinear maps and indistinguishability obfuscation.


2020 ◽  
Vol 33 (3) ◽  
pp. 1080-1113 ◽  
Author(s):  
Martin R. Albrecht ◽  
Pooya Farshim ◽  
Shuai Han ◽  
Dennis Hofheinz ◽  
Enrique Larraia ◽  
...  

AbstractWe provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known results on the constructions of indistinguishability obfuscators from multilinear maps in the reverse direction. We provide two distinct, but closely related constructions and show that multilinear analogues of the $${\text {DDH}} $$DDH assumption hold for them. Our first construction is symmetric and comes with a $$\kappa $$κ-linear map $$\mathbf{e }: {{\mathbb {G}}}^\kappa \longrightarrow {\mathbb {G}}_T$$e:Gκ⟶GT for prime-order groups $${\mathbb {G}}$$G and $${\mathbb {G}}_T$$GT. To establish the hardness of the $$\kappa $$κ-linear $${\text {DDH}} $$DDH problem, we rely on the existence of a base group for which the $$\kappa $$κ-strong $${\text {DDH}} $$DDH assumption holds. Our second construction is for the asymmetric setting, where $$\mathbf{e }: {\mathbb {G}}_1 \times \cdots \times {\mathbb {G}}_{\kappa } \longrightarrow {\mathbb {G}}_T$$e:G1×⋯×Gκ⟶GT for a collection of $$\kappa +1$$κ+1 prime-order groups $${\mathbb {G}}_i$$Gi and $${\mathbb {G}}_T$$GT, and relies only on the 1-strong $${\text {DDH}} $$DDH assumption in its base group. In both constructions, the linearity $$\kappa $$κ can be set to any arbitrary but a priori fixed polynomial value in the security parameter. We rely on a number of powerful tools in our constructions: probabilistic indistinguishability obfuscation, dual-mode NIZK proof systems (with perfect soundness, witness-indistinguishability, and zero knowledge), and additively homomorphic encryption for the group $$\mathbb {Z}_N^{+}$$ZN+. At a high level, we enable “bootstrapping” multilinear assumptions from their simpler counterparts in standard cryptographic groups and show the equivalence of PIO and multilinear maps under the existence of the aforementioned primitives.


Author(s):  
S. Basu ◽  
D. F. Parsons

We are approaching the invasiveness of cancer cells from the studies of their wet surface morphology which should distinguish them from their normal counterparts. In this report attempts have been made to provide physical basis and background work to a wet replication method with a differentially pumped hydration chamber (Fig. 1) (1,2), to apply this knowledge for obtaining replica of some specimens of known features (e.g. polystyrene latex) and finally to realize more specific problems and to improvize new methods and instrumentation for their rectification. In principle, the evaporant molecules penetrate through a pair of apertures (250, 350μ), through water vapors and is, then, deposited on the specimen. An intermediate chamber between the apertures is pumped independently of the high vacuum system. The size of the apertures is sufficiently small so that full saturated water vapor pressure is maintained near the specimen.


Author(s):  
Earl R. Walter ◽  
Glen H. Bryant

With the development of soft, film forming latexes for use in paints and other coatings applications, it became desirable to develop new methods of sample preparation for latex particle size distribution studies with the electron microscope. Conventional latex sample preparation techniques were inadequate due to the pronounced tendency of these new soft latex particles to distort, flatten and fuse on the substrate when they dried. In order to avoid these complications and obtain electron micrographs of undistorted latex particles of soft resins, a freeze-dry, cold shadowing technique was developed. The method has now been used in our laboratory on a routine basis for several years.The cold shadowing is done in a specially constructed vacuum system, having a conventional mechanical fore pump and oil diffusion pump supplying vacuum. The system incorporates bellows type high vacuum valves to permit a prepump cycle and opening of the shadowing chamber without shutting down the oil diffusion pump. A baffeled sorption trap isolates the shadowing chamber from the pumps.


Author(s):  
Dai Dalin ◽  
Guo Jianmin

Lipid cytochemistry has not yet advanced far at the EM level. A major problem has been the loss of lipid during dehydration and embedding. Although the adoption of glutaraldehyde and osmium tetroxide accelerate the chemical reaction of lipid and osmium tetroxide can react on the double bouds of unsaturated lipid to from the osmium black, osmium tetroxide can be reduced in saturated lipid and subsequently some of unsaturated lipid are lost during dehydration. In order to reduce the loss of lipid by traditional method, some researchers adopted a few new methods, such as the change of embedding procedure and the adoption of new embedding media, to solve the problem. In a sense, these new methods are effective. They, however, usually require a long period of preparation. In this paper, we do research on the fiora nectary strucure of lauraceae by the rapid-embedding method wwith PEG under electron microscope and attempt to find a better method to solve the problem mentioned above.


2019 ◽  
Vol 3 (6) ◽  
pp. 707-711 ◽  
Author(s):  
Andrew Peterson ◽  
Adrian M. Owen

In recent years, rapid technological developments in the field of neuroimaging have provided several new methods for revealing thoughts, actions and intentions based solely on the pattern of activity that is observed in the brain. In specialized centres, these methods are now being employed routinely to assess residual cognition, detect consciousness and even communicate with some behaviorally non-responsive patients who clinically appear to be comatose or in a vegetative state. In this article, we consider some of the ethical issues raised by these developments and the profound implications they have for clinical care, diagnosis, prognosis and medical-legal decision-making after severe brain injury.


Sign in / Sign up

Export Citation Format

Share Document