Skip to main content

One-Round Witness Indistinguishability from Indistinguishability Obfuscation

  • Conference paper
Information Security Practice and Experience (ISPEC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9065))

Abstract

In this work, we build up the relationship between witness indistinguishability (WI) and indistinguishability obfuscation (\(i\mathcal{O}\)) by constructing a one-round witness indistinguishable argument system for all languages in NP based on the existence of indistinguishability obfuscator for general circuit class and a number-theoretic assumption. The key tool in our construction is witness encryption scheme with unique decryption which is also proposed and constructed in this work. Our construction of witness encryption scheme with unique decryption is based on a general witness encryption scheme and a weak auxiliary input multi-bit output point obfuscation.

This work is supported by the National Natural Science Foundation of China (Grant No. 60970139,61003276).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. J.ACM 59(2), 6 (2012)

    Article  MathSciNet  Google Scholar 

  3. Barak, B., Ong, S.J., Vadhan, S.: Derandomization in Cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 299–315. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Bitansky, N., Canetti, R.: On strong simulation and composable point obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520–537. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Bitansky, N., Canetti, R., Paneth, O., Rosen, A.: More on the impossibility of VBB obfuscation with auxiliary input. IACR Cryptology ePrint Archive, 2013:701 (2013)

    Google Scholar 

  6. Bitansky, N., Paneth, O.: Point obfuscation and 3-round zero-knowledge. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 190–208. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Brzuska, C., Mittelbach, A.: Indistinguishability obfuscation versus point obfuscation with auxiliary input. IACR Cryptology ePrint Archive, 2014:405 (2014)

    Google Scholar 

  8. Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455–469. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  9. Canetti, R., Dakdouk, R.R.: Obfuscating point functions with multibit output. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489–508. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Dwork, C., Naor, M.: Zaps and their applications. In: proceedings of the 41th Annual Symposium on Foundations of Computer Science, pp. 283–293. ACM (2000)

    Google Scholar 

  11. Feige, U., Shamir, A.: Witness Indistinguishable and Witness Hiding Protocols. In: Proc. 22nd ACM Symposium on the Theory of Computing, pp. 416–426 (1990)

    Google Scholar 

  12. Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: FOCS, pp. 40–49 (2013)

    Google Scholar 

  13. Garg, S., Gentry, C., Sahai, A., Waters, B.: Witness encryption and its applications. In: STOC, pp. 467–476 (2013)

    Google Scholar 

  14. Goldreich, O., Oren, Y.: Definitions and properties of zero-knowledge proof systems. Journal of Cryptology 7(1), 1–32 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  15. Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553–562 (2005)

    Google Scholar 

  16. Goldwasser, S., Kalai, Y.T.: A Note on the Impossibility of Obfuscation with Auxiliary Inputs. IACR Cryptology ePrint Archive, 2013:665 (2013)

    Google Scholar 

  17. Groth, J., Ostrovsky, R., Sahai, A.: New techniques for noninteractive zero-knowledge. J.ACM 59(3), 11 (2012)

    Article  MathSciNet  Google Scholar 

  18. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(16), 186–208 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  19. Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. of the ACM 38(3), 691–729 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  20. Goldwasser, S., Rothblum, G.N.: On best-possible obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194–213. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purposes. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214–232. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  22. Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233–252. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  23. Matsuda, T., Hanaoka, G.: Chosen ciphertext security via point obfuscation. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 95–120. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  24. Wee, H.: On obfuscating point functions. In: STOC, pp. 523–532 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qihua Niu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Niu, Q., Li, H., Huang, G., Liang, B., Tang, F. (2015). One-Round Witness Indistinguishability from Indistinguishability Obfuscation. In: Lopez, J., Wu, Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science(), vol 9065. Springer, Cham. https://doi.org/10.1007/978-3-319-17533-1_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17533-1_38

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17532-4

  • Online ISBN: 978-3-319-17533-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics