How to Generate and Use Universal Samplers

  • Dennis Hofheinz
  • Tibor Jager
  • Dakshita Khurana
  • Amit Sahai
  • Brent Waters
  • Mark Zhandry
Conference paper

DOI: 10.1007/978-3-662-53890-6_24

Volume 10032 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Hofheinz D., Jager T., Khurana D., Sahai A., Waters B., Zhandry M. (2016) How to Generate and Use Universal Samplers. In: Cheon J., Takagi T. (eds) Advances in Cryptology – ASIACRYPT 2016. ASIACRYPT 2016. Lecture Notes in Computer Science, vol 10032. Springer, Berlin, Heidelberg

Abstract

A random oracle is an idealization that allows us to model a hash function as an oracle that will output a uniformly random string given any input. We introduce the notion of a universal sampler scheme that extends the notion of a random oracle, to a method of sampling securely from arbitrary distributions.

We describe several applications that provide a natural motivation for this notion; these include generating the trusted parameters for many schemes from just a single trusted setup. We further demonstrate the versatility of universal samplers by showing how they give rise to simple constructions of identity-based encryption and multiparty key exchange. In particular, we construct adaptively secure non-interactive multiparty key exchange in the random oracle model based on indistinguishability obfuscation; obtaining the first known construction of adaptively secure NIKE without complexity leveraging.

We give a solution that shows how to transform any random oracle into a universal sampler scheme, based on indistinguishability obfuscation. At the heart of our construction and proof is a new technique we call “delayed backdoor programming” that we believe will have other applications.

Copyright information

© International Association for Cryptologic Research 2016

Authors and Affiliations

  • Dennis Hofheinz
    • 1
  • Tibor Jager
    • 2
  • Dakshita Khurana
    • 3
  • Amit Sahai
    • 3
  • Brent Waters
    • 4
  • Mark Zhandry
    • 5
  1. 1.Karlsruher Institut Für TechnologieKarlsruheGermany
  2. 2.Ruhr-Universität BochumBochumGermany
  3. 3.Center for Encrypted FunctionalitiesUCLALos AngelesUSA
  4. 4.Center for Encrypted FunctionalitiesUniversity of Texas at AustinAustinUSA
  5. 5.Princeton UniversityPrincetonUSA