Paper 2014/154
Non-Interactive Cryptography in the RAM Model of Computation
Daniel Apon, Xiong Fan, Jonathan Katz, Feng-Hao Liu, Elaine Shi, and Hong-Sheng Zhou
Abstract
Using recently developed techniques for program obfuscation, we show several constructions of non-interactive cryptosystems in the random-access machine (RAM) model of computation that are asymptotically more efficient than what would be obtained using generic RAM-to-circuit compilation. In particular, let $T$ denote the running time and $n$ the memory size of a RAM program. We show that using differing-inputs obfuscation, functional encryption for arbitrary RAM programs can be achieved with evaluation time $\tilde{O}(T+n)$. Additionally, we provide a number of RAM-model constructions assuming the stronger notion of virtual black-box (VBB) obfuscation. We view these as initial feasibility results and leave instantiating similar protocols from weaker assumptions for future work. Specifically, using VBB obfuscation we show how to construct RAM-model functional encryption with function privacy, fully homomorphic encryption, and stateful, privacy-preserving verifiable computation in the memory-delegation model.
Note: Added authors' contact information
Metadata
- Available format(s)
- -- withdrawn --
- Publication info
- Preprint.
- Keywords
- random access machineprogram obfuscationfunctional encryptionfully homomorphic encryptionverifiable computation
- Contact author(s)
- dapon @ cs umd edu
- History
- 2014-07-15: withdrawn
- 2014-03-01: received
- See all versions
- Short URL
- https://ia.cr/2014/154
- License
-
CC BY