Block cipher based Public Key Encryption viaIndistinguishability Obfuscation

Authors

  • Aleksandra Horubała
  • Michał Andrzejczak
  • Piotr Sapiecha
  • Daniel Waszkiewicz

Abstract

The article is devoted to generation techniques of thenew public key crypto-systems, which are based on applicationof indistinguishability obfuscation methods to selected privatekey crypto-systems. The techniques are applied to symmetrickey crypto-system and the target system is asymmetric one.As an input for our approach an implementation of symmetricblock cipher with a given private-key is considered. Differentobfuscation methods are subjected to processing. The targetsystem would be treated as a public-key for newly createdpublic crypto-system. The approach seems to be interestingfrom theoretical point of view. Moreover, it can be useful forinformation protection in a cloud-computing model.

References

D. Apon, Y. Huang, J.Katz and A. Malozemoff, ”Implementing crypto-graphic program obfusctaion”,Cryptology ePrint Archive, 2014.

B. Barak, O. Goldreich, R.Impagliazzo, S.Rudich, A.Sahai, S. Vadhanand K.Yang, ”On the (im)possibility of obfuscating programs”, Ad-vences in Cryptology - EUROCRYPT 2011, 2011.

G. Boole, ”An investigation of the laws of thought: On which arefounded the mathematical theories of logic and probabilities”, 1854.

J-S. Coron, T. Lepoint and M. Tibouchu, ”Practical multilinear mapsover the integers”, Advances in Cryptology - CRYPTO 2013, vol. 1,8042, pp. 476-493, 2013.

J-S. Coron, T. Lepoint and M. Tibouchu, ”New multilinear maps overthe integers”, Cryptology ePrint Archive, Report 2015/162, 2015.

C. Gentry, ”A fully homomorphic encryption scheme”, PhD thesis,Stanford University, 2009.

S. Garg, C. Gentry and S. Halevi, ”Candidate multilinear maps fromideal lattices”, Advences in Cryptology - EUROCRYPT 2013, 2013,7881 of Lecture Notes in Computer Science pp. 1-17],

C. Gentry, S. Gorbunov, and S. Halevi, ”Graph-induced multilinear mapsfrom lattices”, TCC 2015, Part II, volume 9015 of LNCS, pp. 498–527.Springer, 2015.

A. Malozemoff, Implementation of program obfuscation published ongithub: https://github.com/amaloz/obfuscation. Accesed: 2017-09-20.

A. Sahai and M. Zhandry, ”Obfuscating low-rank matrix branchingprograms”, Cryptology ePrint Archive, Report 2014/772, 2014.

Stunnix - a tool designed for obfuscation of C/C++ programs.http://stunnix.com/prod/cxxo. Accesed: 2018-01-20.

Zelix KlassMaster - a tool designed for obfuscation of JAVA programs.http://stunnix.com/prod/cxxo. Accesed: 2018-01-20.

Opy - a tool designed for obfuscation of PYTHON programs.https://github.com/QQuick/Opy. Accesed: 2018-01-20

Downloads

Published

2018-04-27

Issue

Section

Cryptography and Cybersecurity