Daniel Wichs, Northeastern University, NTT Research
Abstract
Witness encryption (WE) allows us to use an arbitrary NP statement as a public key to encrypt a message, and the witness serves as a decryption key. Security ensures that, when the statement is false, the encrypted message remains computationally hidden. WE appears to be significantly weaker than indistinguishability obfuscation (iO). Indeed, WE is closely related to a highly restricted form of iO that only guarantees security for null circuits (null iO). However, all current approaches towards constructing WE under nice assumptions go through iO. Such constructions are quite complex and are unlikely to lead to practically instantiable schemes. In this work, we revisit a very simple WE and null iO candidate of Chen, Vaikuntanathan and Wee (CRYPTO 2018). We show how to prove its security under a nice and easy-to-state assumption that we refer to as "evasive LWE" following Wee (EUROCRYPT 2022). Roughly speaking, the evasive LWE assumption says the following: assume we have some joint distributions over matrices , and auxiliary information such that
for a uniformly random (and secret) matrix , where are uniformly random matrices, and are chosen from the LWE error distribution with appropriate parameters. Then it must also be the case that:
Essentially the above says that given , getting the additional component is no more useful than just getting the product .
@misc{cryptoeprint:2022/1140,
author = {Vinod Vaikuntanathan and Hoeteck Wee and Daniel Wichs},
title = {Witness Encryption and Null-{IO} from Evasive {LWE}},
howpublished = {Cryptology {ePrint} Archive, Paper 2022/1140},
year = {2022},
url = {https://eprint.iacr.org/2022/1140}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.