Cryptology ePrint Archive: Report 2021/1324

Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption

Kamil Kluczniak

Abstract: In a lockable obfuscation scheme, a party called the obfuscator takes as input a circuit C, a lock value y and, a message m, and outputs an obfuscated circuit. Given the obfuscated circuit, an evaluator can run it on an input x and learn the message if C(x) = y. For security, we require that the obfuscation reveals no information on the circuit as long as the lock y has high entropy even given the circuit C.

The only known constructions of lockable obfuscation schemes require indistinguishability obfuscation (iO) or the learning with errors (LWE) assumption. Furthermore, in terms of technique, all known constructions, excluding iO-based, are build from provably secure variations of graph-induced multilinear maps.

We show a generic construction of a lockable obfuscation scheme build from a (leveled) fully homomorphic encryption scheme that is circularly insecure. Specifically, we need a fully homomorphic encryption scheme that is secure under chosen-plaintext attack (IND-CPA) but for which there is an efficient cycle tester that can detect encrypted key cycles. Our finding sheds new light on how to construct lockable obfuscation schemes and shows why cycle tester constructions were helpful in the design of lockable obfuscation schemes. One of the many use cases for lockable obfuscation schemes are constructions for IND-CPA secure but circularly insecure encryption schemes. Our work shows that there is a connection in both ways between circular insecure encryption and lockable obfuscation.

Category / Keywords: public-key cryptography / Fully Homomorphic Encryption, Lockable Obfuscation, Circular Security, Cycle Testers

Date: received 30 Sep 2021

Contact author: kamil kluczniak at cispa de

Available format(s): PDF | BibTeX Citation

Version: 20211005:153803 (All versions of this report)

Short URL: ia.cr/2021/1324


[ Cryptology ePrint archive ]