Visible to the public Cryptography for Parallel RAM from Indistinguishability Obfuscation

TitleCryptography for Parallel RAM from Indistinguishability Obfuscation
Publication TypeConference Paper
Year of Publication2016
AuthorsChen, Yu-Chi, Chow, Sherman S.M., Chung, Kai-Min, Lai, Russell W.F., Lin, Wei-Kai, Zhou, Hong-Sheng
Conference NameProceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4057-1
Keywordscomposability, computation trace, computation-trace indistinguishability obfuscation, indistinguishability obfuscation, pram, pubcrawl, RAM, randomized encoding, Resiliency, Searchable encryption, theoretical cryptography
Abstract

Since many cryptographic schemes are about performing computation on data, it is important to consider a computation model which captures the prominent features of modern system architecture. Parallel random access machine (PRAM) is such an abstraction which not only models multiprocessor platforms, but also new frameworks supporting massive parallel computation such as MapReduce. In this work, we explore the feasibility of designing cryptographic solutions for the PRAM model of computation to achieve security while leveraging the power of parallelism and random data access. We demonstrate asymptotically optimal solutions for a wide-range of cryptographic tasks based on indistinguishability obfuscation. In particular, we construct the first publicly verifiable delegation scheme with privacy in the persistent database setting, which allows a client to privately delegate both computation and data to a server with optimal efficiency. Specifically, the server can perform PRAM computation on private data with parallel efficiency preserved (up to poly-logarithmic overhead). Our results also cover succinct randomized encoding, searchable encryption, functional encryption, secure multiparty computation, and indistinguishability obfuscation for PRAM. We obtain our results in a modular way through a notion of computational-trace indistinguishability obfuscation (CiO), which may be of independent interests.

URLhttp://doi.acm.org/10.1145/2840728.2840769
DOI10.1145/2840728.2840769
Citation Keychen_cryptography_2016