In particular, this opens the door to obfuscated computations that are {\em sublinear} in the length of their inputs.
The scheme builds on the recent schemes of Koppula-Lewko-Waters and Canetti-Holmgren-Jain-Vaikuntanathan [STOC 15]. A key technical challenge here is how to combine the fixed-prefix technique of KLW, which was developed for deterministic programs, with randomized Oblivious RAM techniques. To overcome that, we develop a method for arguing about the indistinguishability of two obfuscated randomized programs that use correlated randomness. Along the way, we also define and construct garbling schemes that offer only partial protection. These may be of independent interest.
Category / Keywords: public-key cryptography / indistinguishability obfuscation, RAM programs, Oblivious RAM Date: received 25 Apr 2015, last revised 30 Sep 2015 Contact author: holmgren at mit edu Available format(s): PDF | BibTeX Citation Version: 20150930:222402 (All versions of this report) Short URL: ia.cr/2015/388 Discussion forum: Show discussion | Start new discussion