A Note on Black-Box Complexity of Indistinguishability Obfuscation

نویسندگان

  • Mohammad Mahmoody
  • Ameer Mohammed
  • Soheil Nematihaji
  • Rafael Pass
  • Abhi Shelat
چکیده

Mahmoody et al. (TCC 2016-A) showed that basing indistinguishability obfuscation (IO) on a wide range of primitives in a semi-black-box way is as hard as basing public-key cryptography on one-way functions. The list included any primitive P that can be realized relative to random trapdoor permutations or degree-O(1) graded encoding model for any finite ring secure against computationally unbounded polynomial-query attackers. In this note, we rely on the recent result of Brakerski, Brzuska, and Fleischhacker (ePrint 2016/226) and rule out fully black-box constructions of IO from any such primitive P , assuming the existence of one-way functions and NP 6⊆ coAM. At a technical level, we show that attacks in idealized (randomized) oracle models that succeed with constant advantage over the trivial bound (e.g., guessing the obfuscated circuit with probability 1/2 + 1/10) would remain successful for an infinite sequence of security parameters for a non-zero measure of the oracles.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding

We present a new general-purpose obfuscator for all polynomial-size circuits. The obfuscator uses graded encoding schemes, a generalization of multilinear maps. We prove that the obfuscator exposes no more information than the program’s black-box functionality, and achieves virtual black-box security, in the generic graded encoded scheme model. This proof is under the Bounded Speedup Hypothesis...

متن کامل

A Note on Black-Box Separations for Indistinguishability Obfuscation

Mahmoody et al. (TCC 2016-A) showed that basing indistinguishability obfuscation (IO) on a wide range of primitives in a black-box way is as hard as basing public-key cryptography on one-way functions. The list included any primitive P that could be realized relative to random trapdoor permutation or degree-O(1) graded encoding oracle models in a secure way against computationally unbounded pol...

متن کامل

On Quantum Obfuscation

Encryption of data is fundamental to secure communication in the modern world. Beyond encryption of data lies obfuscation, i.e., encryption of functionality. It is well-known that the most powerful means of obfuscating classical programs, so-called “black-box obfuscation,” is provably impossible [BGI+01]. For years since, obfuscation was believed to always be either impossible or useless, depen...

متن کامل

On Extractability (a.k.a. Differing-Inputs) Obfuscation

We initiate the study of extractability obfuscation (a.k.a. differing-inputs obfuscation), a notion first suggested by Barak et al. (JACM 2012): An extractability obfuscator eO for a class of algorithmsM guarantees that if an efficient attacker A can distinguish between obfuscations eO(M1), eO(M2) of two algorithms M1,M2 ∈M, then A can efficiently recover (given M1 and M2) an input on which M1 ...

متن کامل

Applicability of Indistinguishability Obfuscation Seminar report for Research Seminar in Cryptography

The intuitive meaning of obfuscation is taking a program and turning it into a program with the same functionality but somehow unintelligible structure. There have been practical approaches at obfuscating computer programs, but until 2001 [BGI01] there was not much theory in this field. Especially, it was not well defined what is meant by obfuscation. The main step of specifying the meaning of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016