Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.

ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III(2018)

引用 11|浏览101
暂无评分
摘要
In this paper, we propose cryptanalyses of all existing indistinguishability obfuscation (iO) candidates based on branching programs (BP) over GGH13 multilinear map for all recommended parameter settings. To achieve this, we introduce two novel techniques, program converting using NTRU-solver and matrix zeroizing, which can be applied to a wide range of obfuscation constructions and BPs compared to previous attacks. We then prove that, for the suggested parameters, the existing general-purpose BP obfuscations over GGH13 do not have the desired security. Especially, the first candidate indistinguishability obfuscation with input-unpartitionable branching programs (FOCS 2013) and the recent BP obfuscation (TCC 2016) are not secure against our attack when they use the GGH13 with recommended parameters. Previously, there has been no known polynomial time attack for these cases. Our attack shows that the lattice dimension of GGH13 must be set much larger than previous thought in order to maintain security. More precisely, the underlying lattice dimension of GGH13 should be set to n = (Theta) over bar(kappa(2)lambda) to rule out attacks from the subfield algorithm for NTRU where. is the multilinearity level and lambda the security parameter.
更多
查看译文
关键词
Obfuscations,Multilinear maps,Graded encoding schemes,NTRU
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要