Applicability of Indistinguishability Obfuscation Seminar report for Research Seminar in Cryptography

نویسندگان

  • Pille Pullonen
  • Dominique Unruh
چکیده

The intuitive meaning of obfuscation is taking a program and turning it into a program with the same functionality but somehow unintelligible structure. There have been practical approaches at obfuscating computer programs, but until 2001 [BGI01] there was not much theory in this field. Especially, it was not well defined what is meant by obfuscation. The main step of specifying the meaning of obfuscation would be to precisely define this unintelligibility. In the strongest sense we would like to specify that nothing is leaked about the program except the respective input and output behaviour. This has been formalised as virtual black-box (VBB) obfuscation and deemed impossible [BGI01, BGI12]. The next best currently known approach for defining obfuscation is indistinguishability obfuscation. The main benefit is that we know that indistinguishability obfuscation is achievable for all circuits [GGH13]. On the other hand, indistinguishability obfuscation only guarantees that the two programs with the same functionality are indistinguishable when obfuscated. The aim of this work is to introduce the topic of indistinguishability obfuscation by exploring the usefulness of this concept. The level on which the properties and details of different proposed schemes are described in this paper varies a lot. In some cases this paper also tries to give an overview of how indistinguishability obfuscation is used in the proposed applications. Especially, the aim is to outline the most common or more easily understandable approaches. However, in many cases this paper serves as a reference pointing to the ideas rather than discussing the nature of many quite technical constructions. In addition, many cryptographic primitives or ideas are not explicitly defined. The main hope is that every reader would find an area of their interest and see how obfuscation has been applied to advance this field. In the following, Sec 2 defines what we mean by indistinguishability obfuscation and discusses what is provided by this concept. The second half of the paper in Sec 3 lists schemes where obfuscation has been used. The described results include both practical

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Cryptographic Obfuscation

The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic attitude towards general purpose cryptographic obfuscation. Since their first candidate construction, several authors proposed newer and newer schemes with more persuasive security arguments and better efficiency. At the same time, indistinguishability obfuscation proved its extreme usefulness by becoming the basis ...

متن کامل

Patchable Indistinguishability Obfuscation: iO for Evolving Software

In this work, we introduce patchable indistinguishability obfuscation: our notion adapts the notion of indistinguishability obfuscation (iO) to a very general setting where obfuscated software evolves over time. We model this broadly by considering software patches P as arbitrary Turing Machines that take as input the description of a Turing Machine M , and output a new Turing Machine descripti...

متن کامل

Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input

In a recent celebrated breakthrough, Garg et al. (FOCS 2013) gave the first candidate for so-called indistinguishability obfuscation (iO) thereby reviving the interest in obfuscation for a general purpose. Since then, iO has been used to advance numerous sub-areas of cryptography. While indistinguishability obfuscation is a general purpose obfuscation scheme, several obfuscators for specific fu...

متن کامل

Symmetric Cryptography Dagstuhl Seminar

From .. to .., the Dagstuhl Seminar 07021 Symmetric Cryptography was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put toget...

متن کامل

Privacy-oriented Cryptography 1 Executive Summary Creative Commons By-nc-nd 3.0 Unported License

This report documents the program of the Dagstuhl Seminar 12381 “Privacy-Oriented Cryptography”, which took place at Schloss Dagstuhl in September 16-21, 2012. Being the first Dagstuhl seminar that explicitly aimed to combine cryptography and privacy research communities, it attracted a high number of participants, many of whom were new to Dagstuhl. In total, the seminar was attended by 39 inte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014