Limits of Extractability Assumptions with Distributional Auxiliary Input

نویسندگان

  • Elette Boyle
  • Rafael Pass
چکیده

Extractability, or “knowledge,” assumptions have recently gained popularity in the cryptographic community, leading to the study of primitives such as extractable one-way functions, extractable hash functions, succinct non-interactive arguments of knowledge (SNARKs), and differing-inputs obfuscation (diO), and spurring the development of a wide spectrum of new applications relying on these primitives. For most of these applications, it is required that the extractability assumption holds even in the presence of attackers receiving some auxiliary information that is sampled from some fixed efficiently computable distribution Z. We show that, assuming the existence of collision-resistant hash functions, there exist efficient distributions Z,D such that either • extractable one-way functions w.r.t. auxiliary input Z do not exist, or • diO for a distribution of Turing machines and auxiliary input specified by D does not exist. A corollary of this result shows that assuming existence of fully homomorphic encryption with decryption in NC, there exist efficient distributions Z,D such that either • SNARKs for NP w.r.t. auxiliary input Z do not exist, or • diO for a distribution of NC circuits and aux input specified by D does not exist. To achieve our results, we develop a “succinct punctured program” technique, mirroring the powerful punctured program technique of Sahai and Waters (STOC’14), and present several other applications of this new technique. We additionally demonstrate that diO w.r.t. any distribution D of programs and boundedlength auxiliary input is directly implied by any obfuscator that satisfies the weaker indistinguishability obfuscation (iO) security notion and diO for a slightly modified distribution D′ of programs (of slightly greater size) and no auxiliary input. As a consequence, we directly obtain negative results for diO in the absence of auxiliary input. ∗This work was primarily completed while the first author was a postdoc at Cornell University, supported in part by AFOSR YIP Award FA9550-10-1-0093. This research has received funding from the European Union’s Tenth Framework Programme (FP10/ 2010-2016) under grant agreement no. 259426 ERC-CaC. †Pass is supported in part by a Alfred P. Sloan Fellowship, Microsoft New Faculty Fellowship, NSF Award CNS1217821, NSF CAREER Award CCF-0746990, NSF Award CCF-1214844, AFOSR YIP Award FA9550-10-1-0093, and DARPA and AFRL under contract FA8750-11-20211. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the US Government.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Existence of Extractable One-Way Functions

Extractability is one of the main and central tools for design and analysis of modern cryptographic protocols. We say a function is extractable if any adversary that outputs a point in the range of the function is guaranteed to ”know” a corresponding preimage. This research presents a short report on the existence of extractable one-way functions based on a recent paper by Bitansky et al. [BCPR...

متن کامل

A Note on the Impossibility of Obfuscation with Auxiliary Inputs

In this note we revisit the problem of obfuscation with auxiliary inputs. We show that the existence of indistinguishablity obfuscation (iO) implies that all functions with sufficient “pseudoentropy” cannot be obfuscated with respect to a virtual box definition (VBB) in the presence of (dependent) auxiliary input. Namely, we show that for any candidate obfuscation O and for any function family ...

متن کامل

Mann - Withney multivariate nonparametric control chart.

In many quality control applications, the necessary distributional assumptions to correctly apply the traditional parametric control charts are either not met or there is simply not enough information or evidence to verify the assumptions. It is well known that performance of many parametric control charts can be seriously degraded in situations like this. Thus, control charts that do not requi...

متن کامل

Buckley-James Estimator of AFT Models with Auxiliary Covariates

In this paper we study the Buckley-James estimator of accelerated failure time models with auxiliary covariates. Instead of postulating distributional assumptions on the auxiliary covariates, we use a local polynomial approximation method to accommodate them into the Buckley-James estimating equations. The regression parameters are obtained iteratively by minimizing a consecutive distance of th...

متن کامل

Reappraising Poverty of Stimulus Argument: A Corpus Analysis Approach

The debate between empiricism and nativism goes back to the very beginning of philosophy. More recently, the nature of linguistic structure has been the focus of discussion in the field of psycholinguistics. The poverty of stimulus argument for innateness of syntactic knowledge (Chomsky, 1980; Crain & Pietroski, 2001) is one of the most famous and controversial arguments in the study of languag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013