Cryptanalyses of Candidate Branching Program Obfuscators
نویسندگان
چکیده
We describe new cryptanalytic attacks on the candidate branching program obfuscator proposed by Garg, Gentry, Halevi, Raykova, Sahai and Waters (GGHRSW) using the GGH13 graded encoding, and its variant using the GGH15 graded encoding as specified by Gentry, Gorbunov and Halevi. All our attacks require very specific structure of the branching programs being obfuscated, which in particular must have some input-partitioning property. Common to all our attacks are techniques to extract information about the “multiplicative bundling” scalars that are used in the GGHRSW construction. For GGHRSW over GGH13, we show how to recover the ideal generating the plaintext space when the branching program has input partitioning. Combined with the information that we extract about the “multiplicative bundling” scalars, we get a distinguishing attack by an extension of the annihilation attack of Miles, Sahai and Zhandry. Alternatively, once we have the ideal we can solve the principle-ideal problem (PIP) in classical subexponential time or quantum polynomial time, hence obtaining a total break. For the variant over GGH15, we show how to use the left-kernel technique of Coron, Lee, Lepoint and Tibouchi to recover ratios of the bundling scalars. Once we have the ratios of the scalar products, we can use factoring and PIP solvers (in classical subexponential time or quantum polynomial time) to find the scalars themselves, then run mixed-input attacks to break the obfuscation.
منابع مشابه
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted significant gaps in our intuition about security in candidate multilinear map schemes, and in candidate obfuscators that use them. The new attacks, and some that were previously known, are typically called “zeroizing” attacks because they all crucially rely on the ability of the adversary to create encodings o...
متن کاملObfuscating Low-Rank Matrix Branching Programs
In this work, we seek to extend the capabilities of the “core obfuscator” from the work of Garg, Gentry, Halevi, Raykova, Sahai, and Waters (FOCS 2013), and all subsequent works constructing general-purpose obfuscators. This core obfuscator builds upon approximate multilinear maps, and applies to matrix branching programs. All previous works, however, limited the applicability of such core obfu...
متن کاملEvaluation of the effect of dendritic branching on signal processing in hippocampus pyramidal cells
Since branching region of an active nerve fiber is an abrupt widening of the structure, two concepts emerge: first, the stimulating current must be sufficient to raise the outgrowing fibers above the thresh¬old, and secondly, the stimulating current will be divided in proportion to the characteristic admittance of the branches. On the other hand, blocking of the nerve impulse in this region is ...
متن کاملEvaluation of the effect of dendritic branching on signal processing in hippocampus pyramidal cells
Since branching region of an active nerve fiber is an abrupt widening of the structure, two concepts emerge: first, the stimulating current must be sufficient to raise the outgrowing fibers above the thresh¬old, and secondly, the stimulating current will be divided in proportion to the characteristic admittance of the branches. On the other hand, blocking of the nerve impulse in this region is ...
متن کاملObfuscation Combiners
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side. This motivates us to study and present robust combiners for obfuscators, which integrate several candidate obfuscators into ...
متن کامل