Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/FOCS.2012.40guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

From the Impossibility of Obfuscation to a New Non-Black-Box Simulation Technique

Published: 20 October 2012 Publication History

Abstract

The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. Barak's techniques were subsequently extended and have given rise to various powerful applications. We present the first non-black-box simulation technique that does not rely on Barak's technique (or on non-standard assumptions). Our technique is based on essentially different tools: {\em it does not invoke universal arguments}, nor does it rely on collision-resistant hashing. Instead, the main ingredient we use is the impossibility of general program obfuscation (Barak et al., CRYPTO 2001). Using our technique, we construct a new resettably-sound zero-knowledge (\rsZK) protocol. \rsZK protocols remain sound even against cheating provers that can repeatedly reset the verifier to its initial state and random tape. Indeed, for such protocols black-box simulation is impossible. Our $\rsZK$ protocol is the first to be based solely on semi-honest oblivious transfer and does not rely on collision-resistant hashing, in addition, our protocol does not use $\PCP$ machinery. In the converse direction, we show a generic transformation from any $\rsZK$ protocol to a family of functions that cannot be obfuscated.

Cited By

View all
  • (2019)Non-black-box Simulation in the Fully Concurrent Setting, RevisitedJournal of Cryptology10.1007/s00145-018-09309-532:2(393-434)Online publication date: 15-May-2019
  • (2016)3-Message Zero Knowledge Against Human IgnoranceProceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 998510.1007/978-3-662-53641-4_3(57-83)Online publication date: 31-Oct-2016
  • (2016)Indistinguishability ObfuscationProceedings, Part I, of the 13th International Conference on Theory of Cryptography - Volume 956210.1007/978-3-662-49096-9_4(67-95)Online publication date: 10-Jan-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
FOCS '12: Proceedings of the 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science
October 2012
770 pages
ISBN:9780769548746

Publisher

IEEE Computer Society

United States

Publication History

Published: 20 October 2012

Author Tags

  1. non-black-box-simulation
  2. resettable-security
  3. zero-knowledge

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Non-black-box Simulation in the Fully Concurrent Setting, RevisitedJournal of Cryptology10.1007/s00145-018-09309-532:2(393-434)Online publication date: 15-May-2019
  • (2016)3-Message Zero Knowledge Against Human IgnoranceProceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 998510.1007/978-3-662-53641-4_3(57-83)Online publication date: 31-Oct-2016
  • (2016)Indistinguishability ObfuscationProceedings, Part I, of the 13th International Conference on Theory of Cryptography - Volume 956210.1007/978-3-662-49096-9_4(67-95)Online publication date: 10-Jan-2016
  • (2013)On the impossibility of approximate obfuscation and applications to resettable cryptographyProceedings of the forty-fifth annual ACM symposium on Theory of Computing10.1145/2488608.2488639(241-250)Online publication date: 1-Jun-2013
  • (2013)Non-black-box simulation from one-way functions and applications to resettable securityProceedings of the forty-fifth annual ACM symposium on Theory of Computing10.1145/2488608.2488638(231-240)Online publication date: 1-Jun-2013
  • (2013)Non-black-box simulation in the fully concurrent settingProceedings of the forty-fifth annual ACM symposium on Theory of Computing10.1145/2488608.2488637(221-230)Online publication date: 1-Jun-2013
  • (2013)Notions of Black-Box Reductions, RevisitedPart I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 826910.1007/978-3-642-42033-7_16(296-315)Online publication date: 1-Dec-2013

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media