Repository logo
Institutional Digital Repository
Shreenivas Deshpande Library, IIT (BHU), Varanasi

R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications

dc.contributor.authorBhushan K.; Obbattu S.L.B.; Prabhakaran M.; Raghunath R.
dc.date.accessioned2025-05-23T11:13:17Z
dc.description.abstractIn recent breakthrough results, novel use of grabled circuits yielded constructions for several primitives like Identity-Based Encryption (IBE) and 2-round secure multi-party computation, based on standard assumptions in public-key cryptography. While the techniques in these different results have many common elements, these works did not offer a modular abstraction that could be used across them. Our main contribution is to introduce a novel notion of obfuscation, called Reach-Restricted Reactive-Program Obfuscation (R3PO) that captures the essence of these constructions, and exposes additional capabilities. We provide a powerful composition theorem whose proof fully encapsulates the use of garbled circuits in these works. As an illustration of the potential of R3PO, and as an important contribution of independent interest, we present a variant of Multi-Authority Attribute-Based Encryption (MA-ABE) that can be based on (single-authority) CP-ABE in a blackbox manner, using only standard cryptographic assumptions (e.g., DDH) in addition. This is in stark contrast to the existing constructions for MA-ABE, which rely on the random oracle model and supports only limited policy classes. © International Association for Cryptologic Research 2024.
dc.identifier.doihttps://doi.org/10.1007/978-3-031-57725-3_3
dc.identifier.urihttp://172.23.0.11:4000/handle/123456789/5657
dc.relation.ispartofseriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.titleR3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications

Files

Collections