Paper 2015/822
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan and C. Pandu Rangan
Abstract
A re-encryption program (or a circuit) transforms a ciphertext encrypted under Alice's public key $pk_1$ to a ciphertext of the same message encrypted under Bob's public key $pk_2$. Hohenberger et al. (TCC 2007) constructed a pairing-based obfuscator for a family of circuits implementing the re-encryption functionality under a new notion of obfuscation called as \textit{average-case secure obfuscation}. Chandran et al. (PKC 2014) proposed a lattice-based construction for the same. The construction given by Hohenberger et al. could only support encryptions of messages from a polynomial space and the decryption algorithm may have to perform a polynomial number of pairing operations in the worst case. Moreover, the proof of security relies on strong assumptions. On the other hand, the construction given by Chandran et al. relies on standard assumptions on lattices but could only satisfy a relaxed notion of correctness. In this work we propose a simple and efficient obfuscator for the re-encryption functionality which doesn't suffer from \textit{any} of the above mentioned drawbacks. In particular, our construction satisfies the strongest notion of correctness, supports encryption of messages from an exponential sized domain and relies on the standard DDH-assumption. We also strengthen the black-box security model for encryption - re-encryption system proposed by Hohenberger et al. and prove the average-case virtual black box property of our obfuscator as well as the security of our encryption - re-encryption system (in the strengthened model) under the DDH-assumption. All our proofs are in the standard model.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Re-encryption circuitAverage-case secure obfuscationDDH AssumptionStandard Model
- Contact author(s)
- akshayram1993 @ gmail com
- History
- 2016-11-27: revised
- 2015-08-21: received
- See all versions
- Short URL
- https://ia.cr/2015/822
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/822, author = {Akshayaram Srinivasan and C. Pandu Rangan}, title = {Efficiently Obfuscating Re-Encryption Program under {DDH} Assumption}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/822}, year = {2015}, url = {https://eprint.iacr.org/2015/822} }