One-Way Functions and (Im)Perfect Obfuscation

作者: Ilan Komargodski , Tal Moran , Moni Naor , Rafael Pass , Alon Rosen

DOI: 10.1109/FOCS.2014.47

关键词:

摘要: A program obfuscator takes a and outputs "scrambled" version of it, where the goal is that obfuscated will not reveal much about its structure beyond what apparent from executing it. There are several ways formalizing this goal. Specifically, in indistinguishability obfuscation, first defined by Barak et al. (CRYPTO 2001), requirement results obfuscating any two functionally equivalent programs (circuits) be computationally indistinguishable. Recently, fascinating candidate construction for obfuscation was proposed Garg (FOCS 2013). This has led to flurry discovery intriguing constructions primitives protocols whose existence previously known (for instance, fully deniable encryption Sahai Waters, STOC 2014). Most them explicitly rely on additional hardness assumptions, such as one-way functions. Our get rid extra assumption. We cannot argue all polynomial-time circuits implies functions, since if P = NP, then (under notion) possible. Instead, ultimate ≠ NP possible, functions exist. main result ⊄ ioBPP there an efficient (even imperfect) obfuscator, In addition, we show (unconditionally) SZK-arguments NP. This, turn, provides alternative our result, based assumption hard-on-the average problems. To some need obfuscators simple 3CNF formulas.

参考文章(26)
Russell Impagliazzo, Michael Luby, Leonid A. Levin, Pseudo-random Generation from one-way functions (Extended Abstracts) symposium on the theory of computing. pp. 12- 24 ,(1989)
Russell Impagliazzo, Michael Luby, One-way Functions are Essential for Complexity Based Cryptography (Extended Abstract) foundations of computer science. pp. 230- 235 ,(1989)
Dan Boneh, Mark Zhandry, Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Advances in Cryptology – CRYPTO 2014. ,vol. 2013, pp. 480- 499 ,(2014) , 10.1007/978-3-662-44371-2_27
Rafael Pass, Karn Seth, Sidharth Telang, Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings Advances in Cryptology – CRYPTO 2014. pp. 500- 517 ,(2014) , 10.1007/978-3-662-44371-2_28
Elette Boyle, Kai-Min Chung, Rafael Pass, On Extractability Obfuscation Theory of Cryptography. pp. 52- 73 ,(2014) , 10.1007/978-3-642-54242-8_3
R. Ostrovsky, One-way functions, hard on average problems, and statistical zero-knowledge proofs structure in complexity theory annual conference. pp. 133- 138 ,(1991) , 10.1109/SCT.1991.160253
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Two-Round Secure MPC from Indistinguishability Obfuscation Theory of Cryptography. pp. 74- 94 ,(2014) , 10.1007/978-3-642-54242-8_4
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai, Optimizing Obfuscation: Avoiding Barrington's Theorem computer and communications security. pp. 646- 658 ,(2014) , 10.1145/2660267.2660342
Amit Sahai, Brent Waters, How to use indistinguishability obfuscation: deniable encryption, and more symposium on the theory of computing. pp. 475- 484 ,(2014) , 10.1145/2591796.2591825