Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation

نویسندگان

چکیده

The article is devoted to generation techniques of the new public key crypto-systems, which are based on application indistinguishability obfuscation methods selected private crypto-systems. applied symmetric crypto-system and target system asymmetric one. As an input for our approach implementation block cipher with a given private-key considered. Different subjected processing. would be treated as public-key newly created crypto-system. seems interesting from theoretical point view. Moreover, it can useful information protection in cloud-computing model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption

We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional encryption (SKFE). In the construction, SKFE need to be able to issue a-priori unbounded number of functional keys, that is, collusion-resistant. Our strategy is to replace public-key functional encryption (PKFE) in the construction of IO proposed by Bitansky and Vaikuntanath...

متن کامل

Leakage-Resilient Public-Key Encryption from Obfuscation

The literature on leakage-resilient cryptography contains various leakage models that provide different levels of security. In this work, we consider the bounded leakage and the continual leakage models. In the bounded leakage model (Akavia et al. – TCC 2009), it is assumed that there is a fixed upper bound L on the number of bits the attacker may leak on the secret key in the entire lifetime o...

متن کامل

Indistinguishability Obfuscation from Compact Functional Encryption

The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic landscape by enabling several security goals that were previously beyond our reach. Consequently, one of the pressing goals currently is to construct iO from well-studied standard cryptographic assumptions. In this work, we make progress in this direction by presenting a reduction from iO to a natural form of...

متن کامل

Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation

Private functional encryption guarantees that not only the information in ciphertexts is hidden but also the circuits in decryption tokens are protected. A notable use case of this notion is query privacy in searchable encryption. Prior privacy models in the literature were fine-tuned for specific functionalities (namely, identity-based encryption and inner-product encryption), did not model co...

متن کامل

Using Indistinguishability Obfuscation via UCEs

We provide the first standard model construction for a powerful class of Universal Computational Extractors (UCEs; Bellare et al. Crypto 2013) based on indistinguishability obfuscation. Our construction suffices to instantiate q-query correlation-secure hash functions and to extract polynomially many hardcore bits from any one-way function. For many cryptographic primitives and in particular fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electronics and Telecommunications

سال: 2023

ISSN: ['2300-1933', '2081-8491']

DOI: https://doi.org/10.24425/119366