Abstract
We show how to construct indistinguishability obfuscation (\bfi/bfO) for RAM programs with bounded space, assuming/bfi/bfO for circuits and one-way functions, both with subexponential security. That is, given a RAM program whose computation requires space s(n) in the worst case for inputs of length at most n, we generate an obfuscated RAM program that, for inputs of size at most n, runs in roughly the same time as the original program, using space roughly s(n). The obfuscation process is quasi-linear in the description length of the input program and s(n). At the heart of our construction are succinct randomized encodings for RAM programs. We present two very different constructions of such encodings, each with its own unique properties. Beyond their use as a tool in obfuscation for RAM programs, we show that succinct randomized encodings are interesting objects in their own right. We demonstrate the power of succinct randomized encodings in applications such as publicly verifiable delegation, functional encryption for RAMs, and key-dependent security amplification.
| Original language | English |
|---|---|
| Pages (from-to) | 1123-1210 |
| Number of pages | 88 |
| Journal | SIAM Journal on Computing |
| Volume | 47 |
| Issue number | 3 |
| DOIs | |
| State | Published - 2018 |
Keywords
- Bootstrapping
- Cryptography
- Obfuscation
- Randomized encodings
All Science Journal Classification (ASJC) codes
- General Computer Science
- General Mathematics
Fingerprint
Dive into the research topics of 'Indistinguishability obfuscation for ram programs and succinct randomized encodings'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver