Show simple item record

dc.contributor.authorAnanth, Prabhanjan
dc.contributor.authorBrakerski, Zvika
dc.contributor.authorSegev, Gil
dc.contributor.authorVaikuntananthan, Vinod
dc.date.accessioned2021-11-18T13:54:13Z
dc.date.available2021-11-18T13:54:13Z
dc.date.issued2015
dc.identifier.urihttps://hdl.handle.net/1721.1/138151
dc.description.abstract© International Association for Cryptologic Research 2015. This paper studies the question of how to define, construct, and use obfuscators for probabilistic programs. Such obfuscators compil a possibly randomized program into a deterministic one, which achieves computationally indistinguishable behavior from the original program as long as it is run on each input at most once. For obfuscation, we propose a notion that extends indistinguishability obfuscation to probabilistic circuits: It should be hard to distinguish between the obfuscations of any two circuits whose output distributions at each input are computationally indistinguishable, possibly in presence of some auxiliary input. We call the resulting notion probabilistic indistinguishability obfuscation (pIO). We define several variants of pIO, and study relations among them. Moreover, we give a construction of one of our variants, called X-pIO, from sub-exponentially hard indistinguishability obfuscation (for deterministic circuits) and one-way functions. We then move on to show a number of applications of pIO. In particular, we first give a general and natural methodology to achieve fully homomorphic encryption (FHE) from variants of pIO and of semantically secure encryption schemes. In particular, one instantiation leads to FHE from any X-pIO obfuscator and any re-randomizable encryption scheme that’s slightly super-polynomially secure. We note that this constitutes the first construction of full-fledged FHE that does not rely on encryption with circular security. Moreover, assuming sub-exponentially secure puncturable PRFs computable in NC1, sub-exponentially-secure indistinguishability obfuscation for (deterministic) NC1 circuits can be bootstrapped to obtain indistinguishability obfuscation for arbitrary (deterministic) poly-size circuits (previously such bootstrapping was known only assuming FHE with NC1 decryption algorithm).en_US
dc.language.isoen
dc.publisherSpringer Nature America, Incen_US
dc.relation.isversionof10.1007/978-3-662-46497-7_19en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleObfuscation of Probabilistic Circuits and Applicationsen_US
dc.typeArticleen_US
dc.identifier.citationAnanth, Prabhanjan, Brakerski, Zvika, Segev, Gil and Vaikuntananthan, Vinod. 2015. "Obfuscation of Probabilistic Circuits and Applications."
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2019-07-09T16:24:43Z
dspace.date.submission2019-07-09T16:24:44Z
mit.licenseOPEN_ACCESS_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record