2014
DOI: 10.1007/978-3-662-45608-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Using Indistinguishability Obfuscation via UCEs

Abstract: Abstract. We provide the first standard model construction for a powerful class of Universal Computational Extractors (UCEs; Bellare et al. Crypto 2013) based on indistinguishability obfuscation. Our construction suffices to instantiate q-query correlation-secure hash functions and to extract polynomially many hardcore bits from any one-way function.For many cryptographic primitives and in particular for correlation-secure hash functions all known constructions are in the random-oracle model. Indeed, recent ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 42 publications
1
14
0
Order By: Relevance
“…In an important advance, Brzuska and Mittelback [51] bring the first non-trivial positive results, showing that certain forms of UCE are achievable assuming iO and AIPO. BHK14 [19] provide domain-extension methods for UCE in answer to the question above and also show that UCE can overcome some of the limitations of indifferentiability [103] in multi-stage games pointed out by [109].…”
Section: Perspective and Discussionmentioning
confidence: 99%
“…In an important advance, Brzuska and Mittelback [51] bring the first non-trivial positive results, showing that certain forms of UCE are achievable assuming iO and AIPO. BHK14 [19] provide domain-extension methods for UCE in answer to the question above and also show that UCE can overcome some of the limitations of indifferentiability [103] in multi-stage games pointed out by [109].…”
Section: Perspective and Discussionmentioning
confidence: 99%
“…We call this notion strong unpredictability and, indeed, give a construction based on AIPO and indistinguishability obfuscation. An analogous notion of unpredictability has recently been introduced by Brzuska and Mittelbach in the context of UCE security [BM14].…”
Section: On Circumventing Our Impossibility Resultsmentioning
confidence: 99%
“…We weaken the original MB-AIPO definition (Definition 2.9) by requiring that an obfuscation must only be secure for unpredictable distributions that hide the point address even given the the point value m. We call this notion of unpredictability strong unpredictability and note that an analogous notion has recently been introduced in the context of UCE security [BM14]. If we restrict adversaries to strong unpredictability we yield an MB-AIPO notion that we call weak MB-AIPO.…”
Section: Weak Mb-aipo From Aipo and Iomentioning
confidence: 99%
See 2 more Smart Citations