We show the existence of indistinguishability obfuscators (iO) for general circuits assuming subexponential security of: (a) the Learning with Errors (LWE) assumption (with subexponential modulus-to-noise ratio); (b) a circular security conjecture regarding the Gentry-Sahai-Waters' (GSW) encryption scheme and a Packed version of Regev's encryption scheme. The circular security conjecture states that a notion of leakage-resilient security, that we prove is satisfied by GSW assuming LWE, is retained in the presence of an encrypted key-cycle involving GSW and Packed Regev.
Mendeley helps you to discover research relevant for your work.
CITATION STYLE
Gay, R., & Pass, R. (2021). Indistinguishability obfuscation from circular security. In Proceedings of the Annual ACM Symposium on Theory of Computing (pp. 736–749). Association for Computing Machinery. https://doi.org/10.1145/3406325.3451070