Candidate iO in Homomorphic Encryption Schemes
Sanjam Garg from UC Berkeley presents on candidate iO in homomorphic encryption schemes.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Sanjam Garg (UC Berkeley)
Lattices: Algorithms, Complexity, and Cryptography
Seminar, May 7, 2020
https://simons.berkeley.edu/events/candidate-io-homomorphic-encryption-schemes
We propose a new approach to construct general-purpose indistinguishability obfuscation (iO). Our construction is obtained via a new intermediate primitive that we call split fully-homomorphic encryption (split FHE), which we show to be sufficient for constructing iO. Specifically, split FHE is FHE where decryption takes the following two-step syntactic form: (i) A secret decryption step uses the secret key and produces a hint which is (asymptotically) shorter than the length of the encrypted message, and (ii) a public decryption step that only requires the ciphertext and the previously generated hint (and not the entire secret key), and recovers the encrypted message. In terms of security, the hints for a set of ciphertexts should not allow one to violate semantic security for any other ciphertexts.
Next, we show a generic candidate construction of split FHE based on three building blocks: (i) A standard FHE scheme with linear decrypt-and-multiply (which can be instantiated with essentially all LWE-based constructions), (ii) a linearly homomorphic encryption scheme with short decryption hints (such as the Damgard-Jurik encryption scheme, based on the DCR problem), and (iii) a cryptographic hash function (which can be based on a variety of standard assumptions). Our approach is heuristic in the sense that our construction is not provably secure and makes implicit assumptions about the interplay between these underlying primitives. We show evidence that this construction is secure by providing an argument in an appropriately defined oracle model.
We view our construction as a big departure from the state-of-the-art constructions, and it is in fact quite simple.
(Joint work with Zvika Brakerski, Nico Döttling, and Giulio Malavolta)
Video Information
Views
679
Total views since publication
Likes
11
User likes and reactions
Duration
01:13:43
Video length
Published
May 13, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Simons Institute #theoretical computer science #UC Berkeley #Computer Science #Theory of Computation #Theory of Computing
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.