There is no Indistinguishability Obfuscation in Pessiland
نویسندگان
چکیده
We show that if NP , co−RP then the existence of efficient indistinguishability obfuscation (iO) implies the existence of one-way functions. Thus, if we live in “Pessiland”, where NP problems are hard on the average but one-way functions do not exist, or even in “Heuristica”, where NP problems are hard in the worst case but easy on average, then iO is impossible. Our result makes it redundant to explicitly assume the existence of one-way functions in most “cryptographically interesting” applications of iO.
منابع مشابه
Applicability of Indistinguishability Obfuscation Seminar report for Research Seminar in Cryptography
The intuitive meaning of obfuscation is taking a program and turning it into a program with the same functionality but somehow unintelligible structure. There have been practical approaches at obfuscating computer programs, but until 2001 [BGI01] there was not much theory in this field. Especially, it was not well defined what is meant by obfuscation. The main step of specifying the meaning of ...
متن کاملPartial-indistinguishability obfuscation using braids
A circuit obfuscator is an algorithm that translates logic circuits into functionally-equivalent similarlysized logic circuits that are hard to understand. While ad hoc obfuscators exist, theoretical progress has mainly been limited to no-go results. In this work, we propose a new notion of circuit obfuscation, which we call partial indistinguishability. We then prove that, in contrast to previ...
متن کاملA Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
We proposed a new secure oblivious transfer protocol from indistinguishability obfuscation in this paper. Our main technical tool is the candidate indistinguishability obfuscation introduced in [1] and a dual-mode cryptosystem proposed in [2]. Following their steps, we presents a new k-out-of-l oblivious transfer protocol, its realization from DDH is described in this paper, in which we combine...
متن کاملIndistinguishability Obfuscation: From Approximate to Exact
We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 + fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. As a step towards our results, which i...
متن کاملIndistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
We show that if there exist indistinguishability obfuscators for all circuits then there do not exist auxiliary-input extractable one-way functions. In particular, the knowledge of exponent assumption with respect to adversaries with auxiliary input is false in any group where computing discrete logarithms is intractable. The proof uses the “punctured programs” technique of [Sahai-Waters 2013].
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013