- The Pseudorandom Oracle Mod...
- Edit Event
- Cancel Event
- Preview Reminder
- Send Reminder
- Other events happening in October 2022
The Pseudorandom Oracle Model and Ideal Obfuscation
Speaker:
Ji Luo
Date: Friday, October 21, 2022
Time: 10:30 AM to 12:00 PM Note: all times are in the Eastern Time Zone
Public: Yes
Location: G-882
Event Type: Seminar
Room Description:
Host: Vinod Vaikuntanathan , CSAIL MIT
Contact: Felicia Raton, fraton@csail.mit.edu
Relevant URL:
Speaker URL: None
Speaker Photo:
None
Reminders to:
cis-seminars@csail.mit.edu
Reminder Subject:
TALK: The Pseudorandom Oracle Model and Ideal Obfuscation
We introduce a new idealized model of hash functions, which we refer to as the *pseudorandom oracle* (PrO) model. Intuitively, it allows us to model cryptosystems that use the code of a hash function in a non-black-box way. Formally, we model hash functions via a combination of a pseudorandom function (PRF) family and an ideal oracle. A user can initialize the hash function by choosing a PRF key $k$ and the oracle maps it to a public handle $h$. Given the handle $h$ and some input $x$, the oracle will recover the PRF key $k$ and evaluate the PRF on $x$. A user who chooses the PRF key $k$ therefore has a complete description of the hash function and can use its code in non-black-box constructions, while an adversary, who just gets the handle $h$, only has black-box access to the hash function via the oracle.
As our main result, we show how to construct ideal obfuscation in the PrO model, starting from functional encryption (FE), which in turn can be based on well-studied polynomial hardness assumptions. In contrast, we know that ideal obfuscation cannot be instantiated in the basic random oracle model under any assumptions. We believe our result gives a heuristic justification for the following: (1) most natural security goals implied by ideal obfuscation are achievable in the real world; (2) we can construct obfuscation from FE with polynomial security loss.
We also discuss how to interpret our result in the PrO model as a construction of ideal obfuscation using simple hardware tokens or as a way to bootstrap ideal obfuscation for PRFs to that for all functions.
Joint work with Aayush Jain, Rachel Lin, and Daniel Wichs.
Research Areas:
Security & Cryptography
Impact Areas:
Created by Megan F Farmer at Thursday, October 20, 2022 at 10:17 AM.