Optimizing Obfuscation: Avoiding Barrington's Theorem

作者: Prabhanjan Ananth , Divya Gupta , Yuval Ishai , Amit Sahai

DOI: 10.1145/2660267.2660342

关键词:

摘要: In this work, we seek to optimize the efficiency of secure general-purpose obfuscation schemes. We focus on problem optimizing Boolean formulas and branching programs -- corresponds "core obfuscator" from work Garg, Gentry, Halevi, Raykova, Sahai, Waters (FOCS 2013), all subsequent works constructing obfuscators. This core obfuscator builds upon approximate multilinear maps, where in proposed instantiations is closely tied maximum number "levels" multilinearity required. The most efficient previous construction a obfuscator, due Barak, Kalai, Paneth, Sahai (Eurocrypt 2014), required levels be O(l s3.64), s size formula obfuscated, l input bits formula. contrast, our only requires roughly s, or when considering keyed family formulas, namely class functions form fz(x)=phi(z,x) phi s. results significant improvements both total running time evaluating an obfuscated Our improvement obtained by generalizing that can directly obfuscated. generalization allows us achieve simple simulation while avoiding use Barrington's theorem, which constructions relied. Furthermore, ability obfuscate general (without bootstrapping) efficiently apply natural function classes are not known have polynomial-size formulas.

参考文章(51)
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi, Practical Multilinear Maps over the Integers international cryptology conference. ,vol. 2013, pp. 476- 493 ,(2013) , 10.1007/978-3-642-40041-4_26
Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou, Multi-input Functional Encryption theory and application of cryptographic techniques. pp. 578- 602 ,(2014) , 10.1007/978-3-642-55220-5_32
Adeline Langlois, Damien Stehlé, Ron Steinfeld, None, GGHLite: More Efficient Multilinear Maps from Ideal Lattices theory and application of cryptographic techniques. pp. 239- 256 ,(2014) , 10.1007/978-3-642-55220-5_14
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai, Obfuscation for Evasive Functions Theory of Cryptography. pp. 26- 51 ,(2014) , 10.1007/978-3-642-54242-8_2
Rafael Pass, Karn Seth, Sidharth Telang, Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings Advances in Cryptology – CRYPTO 2014. pp. 500- 517 ,(2014) , 10.1007/978-3-662-44371-2_28
Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs, On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Advances in Cryptology – CRYPTO 2014. ,vol. 2013, pp. 518- 535 ,(2014) , 10.1007/978-3-662-44371-2_29
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia, Founding cryptography on tamper-proof hardware tokens theory of cryptography conference. pp. 308- 326 ,(2010) , 10.1007/978-3-642-11799-2_19
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Two-Round Secure MPC from Indistinguishability Obfuscation Theory of Cryptography. pp. 74- 94 ,(2014) , 10.1007/978-3-642-54242-8_4
Martin Sauerhoff, Ingo Wegener, Ralph Werchner, Relating branching program size and formula size over the full binary basis symposium on theoretical aspects of computer science. pp. 57- 67 ,(1999) , 10.1007/3-540-49116-3_5