Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday October 29 2015, @12:21PM   Printer-friendly
from the i20y dept.

"Indistinguishability obfuscation" is a powerful concept that would yield provably secure versions of every cryptographic system we've ever developed and all those we've been unable to develop. But nobody knows how to put it into practice.

Last week, at the IEEE Symposium on Foundations of Computer Science, MIT researchers showed that the problem of indistinguishability obfuscation is, in fact, a variation on a different cryptographic problem, called efficient functional encryption. And while computer scientists don't know how to do efficient functional encryption, either, they believe that they're close — much closer than they thought they were to indistinguishability obfuscation.

Theorists quickly proved that ideal obfuscation would enable almost any cryptographic scheme that they could dream up. But almost as quickly, they proved that it was impossible: There's always a way to construct a program that can't be perfectly obfuscated.

For years, the idea of indistinguishability obfuscation lay idle. But in the last few years, computer scientists have shown how to construct indistinguishability-obfuscation schemes from mathematical objects called multilinear maps. Remarkably, they also showed that even the weaker notion of indistinguishability obfuscation could yield all of cryptography.

http://scienceblog.com/80939/is-a-new-basis-for-all-cryptography-at-hand/

[Also Covered By]: http://phys.org/news/2015-10-basis-cryptography.html

[Source]: http://news.mit.edu/2015/secure-foundation-any-cryptographic-system-1028

[Paper]: https://eprint.iacr.org/2015/163.pdf [PDF]


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Thursday October 29 2015, @02:21PM

    by Anonymous Coward on Thursday October 29 2015, @02:21PM (#256032)

    Well, it's kinda obvious that encryption would work a lot better if a brute force attack produced dozens or hundreds of hits that appeared to be genuine, instead of just one. But making that happen would be a lot easier for a table of financial numbers, or a list of email addresses, as opposed to a business plan for a major corporation let's say.

  • (Score: 0) by Anonymous Coward on Thursday October 29 2015, @06:36PM

    by Anonymous Coward on Thursday October 29 2015, @06:36PM (#256156)
    Not if it "finds" stuff that looks like kiddie porn.