Publications

Detailed Information

Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem

Cited 6 time in Web of Science Cited 5 time in Scopus
Authors

Cheon, Jung Hee; Hhan, Minki; Kim, Jiseung; Lee, Changmin

Issue Date
2018-08
Publisher
Springer Verlag
Citation
Lecture Notes in Computer Science, Vol.10993, pp.184-210
Abstract
© International Association for Cryptologic Research 2018. In this paper, we propose cryptanalyses of all existing indistinguishability obfuscation (iO) candidates based on branching programs (BP) over GGH13 multilinear map for all recommended parameter settings. To achieve this, we introduce two novel techniques, program converting using NTRU-solver and matrix zeroizing, which can be applied to a wide range of obfuscation constructions and BPs compared to previous attacks. We then prove that, for the suggested parameters, the existing general-purpose BP obfuscations over GGH13 do not have the desired security. Especially, the first candidate indistinguishability obfuscation with input-unpartitionable branching programs (FOCS 2013) and the recent BP obfuscation (TCC 2016) are not secure against our attack when they use the GGH13 with recommended parameters. Previously, there has been no known polynomial time attack for these cases. Our attack shows that the lattice dimension of GGH13 must be set much larger than previous thought in order to maintain security. More precisely, the underlying lattice dimension of GGH13 should be set to (formula presented) to rule out attacks from the subfield algorithm for NTRU where κ is the multilinearity level and λ the security parameter.
ISSN
0302-9743
URI
https://hdl.handle.net/10371/195144
DOI
https://doi.org/10.1007/978-3-319-96878-0_7
Files in This Item:
There are no files associated with this item.
Appears in Collections:

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share