Show simple item record

dc.contributor.authorBitansky, Nir
dc.contributor.authorPaneth, Omer
dc.date.accessioned2016-01-13T23:54:16Z
dc.date.available2016-01-13T23:54:16Z
dc.date.issued2015-10
dc.date.submitted2015-03
dc.identifier.issn0097-5397
dc.identifier.issn1095-7111
dc.identifier.urihttp://hdl.handle.net/1721.1/100819
dc.description.abstractThe introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. Barak's technique has given rise to various powerful applications and is a key component in all known protocols with non-black-box simulation. We present the first non-black-box simulation technique that does not rely on Barak's technique (or on nonstandard assumptions). Invoking this technique, we obtain new and improved protocols resilient to various resetting attacks. These improvements include weaker computational assumptions and better round complexity. A prominent feature of our technique is its compatibility with rewinding techniques from classic black-box zero-knowledge protocols. The combination of rewinding with non-black-box simulation has proven instrumental in coping with challenging goals such as simultaneously resettable zero-knowledge, proofs of knowledge, and resettable security from one-way functions. While previous works required tailored modifications to Barak's technique, we give a general recipe for combining our technique with rewinding. This yields simplified resettable protocols in the above settings, as well as improvements in round complexity and required computational assumptions. The main ingredient in our technique is a new impossibility result for general program obfuscation. The results extend the impossibility result of Barak et al. (CRYPTO 2001) to the case of obfuscation with approximate functionality, thus settling a question left open by Barak et al. In the converse direction, we show a generic transformation from any resettably sound zero-knowledge protocol to a family of functions that cannot be obfuscated.en_US
dc.description.sponsorshipCheck Point Institute for Information Securityen_US
dc.description.sponsorshipIsrael Science Foundation (Grant 20006317)en_US
dc.description.sponsorshipFulbright Programen_US
dc.description.sponsorshipIBM Research (Ph.D. Fellowship)en_US
dc.language.isoen_US
dc.publisherSociety for Industrial and Applied Mathematicsen_US
dc.relation.isversionofhttp://dx.doi.org/10.1137/130928236en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceSociety for Industrial and Applied Mathematicsen_US
dc.titleOn Non-Black-Box Simulation and the Impossibility of Approximate Obfuscationen_US
dc.typeArticleen_US
dc.identifier.citationBitansky, Nir, and Omer Paneth. “On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation.” SIAM Journal on Computing 44, no. 5 (January 2015): 1325–1383. © 2015 Society for Industrial and Applied Mathematicsen_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.mitauthorBitansky, Niren_US
dc.relation.journalSIAM Journal on Computingen_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dspace.orderedauthorsBitansky, Nir; Paneth, Omeren_US
dc.identifier.orcidhttps://orcid.org/0000-0001-8361-6035
mit.licensePUBLISHER_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record