Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
نویسندگان
چکیده
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application indistinguishability obfuscation methods selected private crypto-systems. applied symmetric crypto-system and target system asymmetric one. As an input for our approach implementation block cipher with a given private-key considered. Different subjected processing. would be treated as public-key newly created crypto-system. seems interesting from theoretical point view. Moreover, it can useful information protection in cloud-computing model.
منابع مشابه
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional encryption (SKFE). In the construction, SKFE need to be able to issue a-priori unbounded number of functional keys, that is, collusion-resistant. Our strategy is to replace public-key functional encryption (PKFE) in the construction of IO proposed by Bitansky and Vaikuntanath...
متن کاملLeakage-Resilient Public-Key Encryption from Obfuscation
The literature on leakage-resilient cryptography contains various leakage models that provide different levels of security. In this work, we consider the bounded leakage and the continual leakage models. In the bounded leakage model (Akavia et al. – TCC 2009), it is assumed that there is a fixed upper bound L on the number of bits the attacker may leak on the secret key in the entire lifetime o...
متن کاملIndistinguishability Obfuscation from Compact Functional Encryption
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic landscape by enabling several security goals that were previously beyond our reach. Consequently, one of the pressing goals currently is to construct iO from well-studied standard cryptographic assumptions. In this work, we make progress in this direction by presenting a reduction from iO to a natural form of...
متن کاملPrivate Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Private functional encryption guarantees that not only the information in ciphertexts is hidden but also the circuits in decryption tokens are protected. A notable use case of this notion is query privacy in searchable encryption. Prior privacy models in the literature were fine-tuned for specific functionalities (namely, identity-based encryption and inner-product encryption), did not model co...
متن کاملUsing Indistinguishability Obfuscation via UCEs
We provide the first standard model construction for a powerful class of Universal Computational Extractors (UCEs; Bellare et al. Crypto 2013) based on indistinguishability obfuscation. Our construction suffices to instantiate q-query correlation-secure hash functions and to extract polynomially many hardcore bits from any one-way function. For many cryptographic primitives and in particular fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electronics and Telecommunications
سال: 2023
ISSN: ['2300-1933', '2081-8491']
DOI: https://doi.org/10.24425/119366