Paper 2024/392

Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle

Zhuang Shan, School of Mathematics and Statistics, Xidian University, Xi’an 710126, China
Leyou Zhang, School of Mathematics and Statistics, Xidian University, Xi’an 710126, China
Qing Wu, School of Automation, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
Abstract

This paper introduces a heuristic ideal obfuscation scheme grounded in the learning problem, which differs from that proposed by Jain, Lin, and Luo [JLLW23]. The approach in this paper follows a methodology akin to that of Brakerski, Dottling, Garg, and Malavolta [BDGM22,BDGM20] for building iO. We construct a new ideal obfuscation by leveraging a variant of LWR to build LHE and employing Evasive LWR to construct multilinear maps. In contrast to the methodology of Jain et al., this paper provides a more detailed approach. Initially, we reprove the hardness of LWR using the prime number theorem and the fixed-point theorem, showing that the statistical distance between $\lfloor As\rfloor_p$ and $\lfloor u\rfloor_p$ does not exceed $\exp\left(-\frac{n\log_2n\ln p}{\sqrt{5}}\right)$ when the security parameter $q>2^{n}p$. Additionally, we provide definitions for Evasive LWR and composite homomorphic pseudorandom function, and based on these, we construct multilinear maps, thereby establishing the ideal obfuscation scheme proposed in this paper.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
Ideal obfuscationSplit FHEMultilinear mapsLattice problem reductionEvasive Lattice
Contact author(s)
arcsec30 @ 163 com
lyzhang @ mail xidian edu cn
History
2024-05-10: revised
2024-03-04: received
See all versions
Short URL
https://ia.cr/2024/392
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/392,
      author = {Zhuang Shan and Leyou Zhang and Qing Wu},
      title = {Heuristic Ideal Obfuscation Scheme based on LWE  Problem, its Variants and Quantum Oracle},
      howpublished = {Cryptology ePrint Archive, Paper 2024/392},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/392}},
      url = {https://eprint.iacr.org/2024/392}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.