Constrained Pseudorandom Functions for Unconstrained Inputs - - PowerPoint PPT Presentation

constrained pseudorandom functions for unconstrained
SMART_READER_LITE
LIVE PREVIEW

Constrained Pseudorandom Functions for Unconstrained Inputs - - PowerPoint PPT Presentation

Constrained Pseudorandom Functions for Unconstrained Inputs Apoorvaa Deshpande (Brown University) Venkata Koppula (University of Texas at Austin) Brent Waters (University of Texas at Austin) Pseudorandom Functions (Goldreich-Goldwasser-Micali


slide-1
SLIDE 1

Constrained Pseudorandom Functions for Unconstrained Inputs

Apoorvaa Deshpande (Brown University) Venkata Koppula (University of Texas at Austin) Brent Waters (University of Texas at Austin)

slide-2
SLIDE 2

Pseudorandom Functions

(Goldreich-Goldwasser-Micali 84)

slide-3
SLIDE 3

Pseudorandom Functions

(Goldreich-Goldwasser-Micali 84)

Keyed Function F Key space K Numerous applications in Cryptography

slide-4
SLIDE 4

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

slide-5
SLIDE 5

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

Keyed Function F, Key Space K

slide-6
SLIDE 6

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

Keyed Function F, Key Space K Constrain

Constraint T

K K{T}

T

slide-7
SLIDE 7

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

Keyed Function F, Key Space K For all x s.t. x satisfies T, F(K , x) = F(K{T} , x) Constrain

Constraint T

K K{T}

T

slide-8
SLIDE 8

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

Families of Constraints:

slide-9
SLIDE 9

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

  • Puncturable PRFs
  • Key can evaluate PRF at all points except ‘punctured point’
  • Goldreich-Goldwasswer-Micali 84 PRFs are puncturable PRFs
  • Punctured programming approach (Sahai-Waters 14)


Families of Constraints:

slide-10
SLIDE 10

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

  • Puncturable PRFs
  • Key can evaluate PRF at all points except ‘punctured point’
  • Goldreich-Goldwasswer-Micali 84 PRFs are puncturable PRFs
  • Punctured programming approach (Sahai-Waters 14)

  • Bit Fixing PRFs
  • Key for a string s in {0, 1, ⍊}n : can evaluate PRF at all points fixed by s
  • Multilinear maps based construction (Boneh-Waters 13)
  • Optimal broadcast encryption

Families of Constraints:

slide-11
SLIDE 11

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

  • Circuit Constrained PRFs
  • Key corresponding to circuit C : can evaluate PRF at input x if C(x) = 1
  • Multilinear maps based construction (Boneh-Waters 13), iO based

construction (Boneh-Zhandry 14)

  • Identity based Noninteractive Key Exchange (Boneh-Waters 13)

Families of Constraints:

slide-12
SLIDE 12

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

  • Circuit Constrained PRFs
  • Key corresponding to circuit C : can evaluate PRF at input x if C(x) = 1
  • Multilinear maps based construction (Boneh-Waters 13), iO based

construction (Boneh-Zhandry 14)

  • Identity based Noninteractive Key Exchange (Boneh-Waters 13)

Families of Constraints:

Circuits can handle only bounded length inputs!

slide-13
SLIDE 13

Constrained PRFs

(Boneh-Waters, Boyle-Goldwasser-Ivan, Kiayias-Papadopoulos-Triandopoulos-Zacharias)

  • Circuit Constrained PRFs
  • Key corresponding to circuit C : can evaluate PRF at input x if C(x) = 1
  • Multilinear maps based construction (Boneh-Waters 13), iO based

construction (Boneh-Zhandry 14)

  • Identity based Noninteractive Key Exchange (Boneh-Waters 13)

Families of Constraints:

Circuits can handle only bounded length inputs!

for bounded number of users

slide-14
SLIDE 14

Constrained PRFs for Unconstrained Inputs

slide-15
SLIDE 15

Constrained PRFs for Unconstrained Inputs

Turing Machine Constrained PRFs

Abusalah, Fuchsbauer, Pietrzak 14

slide-16
SLIDE 16

Constrained PRFs for Unconstrained Inputs

Turing Machine Constrained PRFs

Abusalah, Fuchsbauer, Pietrzak 14

  • Identity based Noninteractive Key Exchange : unbounded users
  • Broadcast encryption : unbounded users
slide-17
SLIDE 17

Constrained PRFs for Unconstrained Inputs

Turing Machine Constrained PRFs

Abusalah, Fuchsbauer, Pietrzak 14

Construction based on knowledge-type assumption

  • Identity based Noninteractive Key Exchange : unbounded users
  • Broadcast encryption : unbounded users
slide-18
SLIDE 18

Code Obfuscation

slide-19
SLIDE 19

Code Obfuscation

Goal: Make programs maximally unintelligible.

slide-20
SLIDE 20

Code Obfuscation

Goal: Make programs maximally unintelligible.

Obfuscator

P P’

P(x) = P’(x) for all inputs x

slide-21
SLIDE 21

Code Obfuscation

Security for obfuscation

slide-22
SLIDE 22

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)
slide-23
SLIDE 23

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Obfuscated code

Oracle access to code

slide-24
SLIDE 24

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001)

slide-25
SLIDE 25

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001)

slide-26
SLIDE 26

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001) If diO(P1) and diO(P2) are distinguishable, then one can extract differing input.

slide-27
SLIDE 27

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001) If diO(P1) and diO(P2) are distinguishable, then one can extract differing input. Implausibility results (Boyle et al, Garg et al, Bellare et al.)

slide-28
SLIDE 28

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Public coins differing inputs

  • bfuscation (pcdiO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001) If diO(P1) and diO(P2) are distinguishable, then one can extract differing input. Implausibility results (Boyle et al, Garg et al, Bellare et al.)

slide-29
SLIDE 29

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Public coins differing inputs

  • bfuscation (pcdiO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001) If diO(P1) and diO(P2) are distinguishable, then one can extract differing input. Implausibility results (Boyle et al, Garg et al, Bellare et al.) No implausibility results, but has ‘extractability’ nature

slide-30
SLIDE 30

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Public coins differing inputs

  • bfuscation (pcdiO)

Indistinguishability

  • bfuscation (iO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001) If diO(P1) and diO(P2) are distinguishable, then one can extract differing input. Implausibility results (Boyle et al, Garg et al, Bellare et al.) No implausibility results, but has ‘extractability’ nature

slide-31
SLIDE 31

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Public coins differing inputs

  • bfuscation (pcdiO)

Indistinguishability

  • bfuscation (iO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001) If diO(P1) and diO(P2) are distinguishable, then one can extract differing input. Implausibility results (Boyle et al, Garg et al, Bellare et al.) No implausibility results, but has ‘extractability’ nature If P1 and P2 functionally identical, then iO(P1) ≈ iO(P2)

slide-32
SLIDE 32

Code Obfuscation

Security for obfuscation

Virtual Black Box

  • bfuscation (VBB)

Differing inputs

  • bfuscation (diO)

Public coins differing inputs

  • bfuscation (pcdiO)

Indistinguishability

  • bfuscation (iO)

Obfuscated code

Oracle access to code Impossibility results (Barak et al. 2001) If diO(P1) and diO(P2) are distinguishable, then one can extract differing input. Implausibility results (Boyle et al, Garg et al, Bellare et al.) No implausibility results, but has ‘extractability’ nature If P1 and P2 functionally identical, then iO(P1) ≈ iO(P2)

slide-33
SLIDE 33

Constrained PRFs for Unconstrained Inputs

Turing Machine Constrained PRFs

Abusalah, Fuchsbauer, Pietrzak 14

Construction based on public coins differing inputs obfuscator

  • Identity based Noninteractive Key Exchange : unbounded users
  • Broadcast encryption : unbounded users
slide-34
SLIDE 34

Can we build a constrained PRF scheme for Turing machines based on indistinguishability obfuscation (iO)?

slide-35
SLIDE 35

Can we build a constrained PRF scheme for Turing machines based on indistinguishability obfuscation (iO)?

iO for circuits

Boneh- Zhandry 14

Circuit constrained PRFs

slide-36
SLIDE 36

Can we build a constrained PRF scheme for Turing machines based on indistinguishability obfuscation (iO)?

iO for circuits

Boneh- Zhandry 14

Circuit constrained PRFs iO for Turing Machines iO for circuits

K, Lewko, Waters 14

slide-37
SLIDE 37

Can we build a constrained PRF scheme for Turing machines based on indistinguishability obfuscation (iO)?

iO for circuits

Boneh- Zhandry 14

Circuit constrained PRFs iO for Turing Machines iO for circuits

K, Lewko, Waters 14

Turing Machines constrained PRFs

??

slide-38
SLIDE 38

Can we build a constrained PRF scheme for Turing machines based on indistinguishability obfuscation (iO)?

iO for circuits

Boneh- Zhandry 14

Circuit constrained PRFs iO for Turing Machines iO for circuits

K, Lewko, Waters 14

Turing Machines constrained PRFs

??

bounded length inputs only

slide-39
SLIDE 39

Our Results

Assuming iO (and one way functions), we show a constrained PRF scheme for Turing machines.

slide-40
SLIDE 40

Our Results

Assuming iO (and one way functions), we show a constrained PRF scheme for Turing machines.

Assuming iO (and one way functions), we show an Attribute Based Encryption scheme for Turing machines.

F R E E ! !

slide-41
SLIDE 41

Security of Constrained PRFs

slide-42
SLIDE 42

Security of Constrained PRFs

Selective Security

slide-43
SLIDE 43

Security of Constrained PRFs

Chooses PRF key K. Selective Security

slide-44
SLIDE 44

Security of Constrained PRFs

Chooses PRF key K. Selective Security x* y*= PRF(K, x*)

  • r random
slide-45
SLIDE 45

Security of Constrained PRFs

Chooses PRF key K. Selective Security x* y*= PRF(K, x*)

  • r random

Mi K{Mi} Mi(x*) = 0

slide-46
SLIDE 46

Security of Constrained PRFs

Chooses PRF key K. Guess PRF/random Selective Security x* y*= PRF(K, x*)

  • r random

Mi K{Mi} Mi(x*) = 0

slide-47
SLIDE 47

Indistinguishability Obfuscation for Circuits

Indistinguishability Obfuscator C0, C1 functionally identical circuits. iO(C0) ≈ iO(C1)

slide-48
SLIDE 48

Indistinguishability Obfuscation for Circuits

Indistinguishability Obfuscator C0, C1 functionally identical circuits. iO(C0) ≈ iO(C1)

Candidate iO schemes for circuits:

Garg-Gentry-Halevi-Raykova-Sahai-Waters 13 Barak-Garg-Kalai-Paneth-Sahai 14 Zimmerman 14 …

slide-49
SLIDE 49

PRFs with Unbounded Inputs

slide-50
SLIDE 50

PRFs with Unbounded Inputs

PRF F with bounded length inputs

slide-51
SLIDE 51

PRFs with Unbounded Inputs

PRF F with bounded length inputs For unbounded inputs : Choose PRF key K, hash function H

slide-52
SLIDE 52

PRFs with Unbounded Inputs

PRF F with bounded length inputs For unbounded inputs : Choose PRF key K, hash function H Output F(K, v)

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

v Merkle Tree

slide-53
SLIDE 53

Our Constrained PRF Construction

slide-54
SLIDE 54

Our Constrained PRF Construction

Puncturable PRF F with bounded length inputs

slide-55
SLIDE 55

Our Constrained PRF Construction

Puncturable PRF F with bounded length inputs Choose puncturable PRF key K, special hash function H Our scheme’s PRF key : (K, H)

slide-56
SLIDE 56

Our Constrained PRF Construction

Puncturable PRF F with bounded length inputs Choose puncturable PRF key K, special hash function H Our scheme’s PRF key : (K, H)

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

Output F(K, v) v

slide-57
SLIDE 57

Our Constrained PRF Construction

Constrained key for Turing machine M

Next- Step

state, symbol state’, symbol’, head-movement

slide-58
SLIDE 58

Our Constrained PRF Construction

Constrained key for Turing machine M

Next- Step

state, symbol state’, symbol’, head-movement

K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

slide-59
SLIDE 59

K{M} = H, iO(Prog-Iterate), iO(Prog-Start) Prog-Start

v sig

Output signature on (start-state, v).

slide-60
SLIDE 60

K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

1 1 1

Hash

  • f input

Prog-Start

v sig

Output signature on (start-state, v).

slide-61
SLIDE 61

K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

slide-62
SLIDE 62

Prog-Iterate K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

slide-63
SLIDE 63

Prog-Iterate K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ v st, sym t, p st’, sym'

Hash

  • f input
slide-64
SLIDE 64

Prog-Iterate K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

Adversary not bound to correct execution.

If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ v st, sym t, p st’, sym'

Hash

  • f input
slide-65
SLIDE 65

Prog-Iterate K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

Adversary not bound to correct execution.

If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ v st, sym t, p st’, sym'

Hash

  • f input

h’ Using h, verify sym at position p Using sym’, update h to h’ h

Hash of work tape

slide-66
SLIDE 66

Prog-Iterate K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

Adversary not bound to correct execution.

Verify sig on (st, h) sig sig’ Output signature on (st’, h’) If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ v st, sym t, p st’, sym'

Hash

  • f input

h’ Using h, verify sym at position p Using sym’, update h to h’ h

Hash of work tape

slide-67
SLIDE 67

Prog-Iterate K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

Verify sig on (st, h) sig sig’ Output signature on (st’, h’) If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ v st, sym t, p st’, sym' h’ Using h, verify sym at position p Using sym’, update h to h’ h

slide-68
SLIDE 68

Prog-Iterate K{M} = H, iO(Prog-Iterate), iO(Prog-Start)

Verify sig on (st, h) sig sig’ Output signature on (st’, h’) If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ v st, sym t, p st’, sym' h’ Using h, verify sym at position p Using sym’, update h to h’ h

slide-69
SLIDE 69

Merkle Trees: Succinct Proof

H

H H

H H H H

H H H H H H H H

h

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

slide-70
SLIDE 70

Merkle Trees: Succinct Proof

H

H H

H H H H

H H H H H H H H

h

Prove m is at position p

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

slide-71
SLIDE 71

Merkle Trees: Succinct Proof

H

H H

H H H H

H H H H H H H H

h

Prove m is at position p

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

slide-72
SLIDE 72

Merkle Trees: Succinct Proof

H

H H

H H H H

H H H H H H H H

h

Prove m is at position p

Output hash values at path from root to node, and their siblings 1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

slide-73
SLIDE 73

Merkle Trees: Succinct Proof

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

h

Prove m is at position p

Output hash values at path from root to node, and their siblings

slide-74
SLIDE 74

Merkle Trees: Update Hash

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

h

slide-75
SLIDE 75

Merkle Trees: Update Hash

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

h

Update h to write m at position p

slide-76
SLIDE 76

Merkle Trees: Update Hash

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

h

Update h to write m at position p

Need hash values at path from root to node, and their siblings

slide-77
SLIDE 77

Merkle Trees: Update Hash

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

h

Update h to write m at position p

Need hash values at path from root to node, and their siblings

slide-78
SLIDE 78

Merkle Trees: Update Hash

H

H H

H H H H

H H H H H H H H

1 0 0 1 0 1 0 1 1 1 0 1 1 1 0 0

h

Update h to write m at position p

Need hash values at path from root to node, and their siblings

slide-79
SLIDE 79

Proving Selective Security

slide-80
SLIDE 80

Proving Selective Security

Chooses PRF key K.

slide-81
SLIDE 81

Proving Selective Security

Chooses PRF key K. x* y*= F(K, hash of x*)

  • r random
slide-82
SLIDE 82

Proving Selective Security

Chooses PRF key K. x* y*= F(K, hash of x*)

  • r random

v*

slide-83
SLIDE 83

Proving Selective Security

Chooses PRF key K. x* y*= F(K, hash of x*)

  • r random

M K{M} = (H, iO(Prog-Start), iO(Prog-Iterate))

(s.t. M(x*) = 0)

v*

slide-84
SLIDE 84

Proving Selective Security

Chooses PRF key K. Guess PRF/random x* y*= F(K, hash of x*)

  • r random

M K{M} = (H, iO(Prog-Start), iO(Prog-Iterate))

(s.t. M(x*) = 0)

v*

slide-85
SLIDE 85

Proving Selective Security

Chooses PRF key K. Guess PRF/random x* y*= F(K, hash of x*)

  • r random

M K{M} = (H, iO(Prog-Start), iO(Prog-Iterate))

(s.t. M(x*) = 0)

Contains PRF key K v*

slide-86
SLIDE 86

Proving Selective Security

Prog-Iterate

Verify sig on st and h Output signature on st’ and h’ If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ Using h, verify sym at position p Using sym’, update h to h’

slide-87
SLIDE 87

Proving Selective Security

Prog-Iterate

Verify sig on st and h Output signature on st’ and h’ If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ Using h, verify sym at position p Using sym’, update h to h’

Prog-Iterate’

Verify sig on st and h Output signature on st’ and h’ Else if st’ = final, output F(K{v*}, v)

Next- Step

st, sym st’, sym’ Using h, verify sym at position p Using sym’, update h to h’ If st’ = final and v=v*, output ⍊

slide-88
SLIDE 88

Proving Selective Security

Prog-Iterate

Verify sig on st and h Output signature on st’ and h’ If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ Using h, verify sym at position p Using sym’, update h to h’

???

Prog-Iterate’

Verify sig on st and h Output signature on st’ and h’ Else if st’ = final, output F(K{v*}, v)

Next- Step

st, sym st’, sym’ Using h, verify sym at position p Using sym’, update h to h’ If st’ = final and v=v*, output ⍊

slide-89
SLIDE 89

Need iO-Compatible Primitives

Primitives Required for our Construction:

(Collision resistant) Hash functions Signature Schemes Indistinguishability Obfuscation

slide-90
SLIDE 90

Need iO-Compatible Primitives

Primitives Required for our Construction:

(Collision resistant) Hash functions Signature Schemes Indistinguishability Obfuscation Positional Accumulators Splittable Signature Schemes

slide-91
SLIDE 91

Need iO-Compatible Primitives

Primitives Required for our Construction:

(Collision resistant) Hash functions Signature Schemes Indistinguishability Obfuscation Positional Accumulators Splittable Signature Schemes iO for Turing Machines

(K, Lewko, Waters 14)

slide-92
SLIDE 92

Proving Selective Security

Prog-Iterate

Verify sig on st and h Output signature on st’ and h’ If st’ = final, output F(K, v)

Next- Step

st, sym st’, sym’ Using h, verify sym at position p Using sym’, update h to h’

Prog-Iterate’

Verify sig on st and h Output signature on st’ and h’ Else if st’ = final, output F(K{v*}, v)

Next- Step

st, sym st’, sym’ Using h, verify sym at position p Using sym’, update h to h’

If st’ = final and v=v*, output ⍊

KLW techniques

slide-93
SLIDE 93

Conclusions

slide-94
SLIDE 94

Conclusions

  • Constrained PRFs for Turing machines based on iO and one

way functions

slide-95
SLIDE 95

Conclusions

  • Constrained PRFs for Turing machines based on iO and one

way functions

  • Unbounded broadcast encryption, unbounded ID-NIKE from iO

and OWFs

  • unbounded broadcast encryption - Zhandry 14
  • unbounded ID-NIKE - Khurana, Rao, Sahai 15
slide-96
SLIDE 96

Conclusions

  • Constrained PRFs for Turing machines based on iO and one

way functions

  • Unbounded broadcast encryption, unbounded ID-NIKE from iO

and OWFs

  • unbounded broadcast encryption - Zhandry 14
  • unbounded ID-NIKE - Khurana, Rao, Sahai 15
  • Attribute Based Encryption for Turing machines
  • Functional Encryption for Turing machines - Ananth, Sahai 15
slide-97
SLIDE 97

Danke!