1 / 41

On the Impossibility of Approximate Obfuscation

On the Impossibility of Approximate Obfuscation. Nir Bitansky and Omer Paneth. Program Obfuscation. Compute . Program Obfuscation. Program Obfuscation. Sign email with If starts with “omer@bu.edu”. Virtual Black-Box.

fisseha
Download Presentation

On the Impossibility of Approximate Obfuscation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. On the Impossibility of Approximate Obfuscation NirBitansky and Omer Paneth

  2. Program Obfuscation Compute

  3. Program Obfuscation

  4. Program Obfuscation Sign email with If starts with “omer@bu.edu”

  5. Virtual Black-Box [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01] is an obfuscation of : • Functionality: • Security:

  6. Impossibility of Obfuscation There exist families of functions that cannot be obfuscated [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

  7. Relaxed Security [Barak et al. 01, Goldwasser-Rothblum07,Hofheinz-Malone-Lee-Stam07, Hohenberger-Rothblum-Shelat-Vaikuntanathan07, Bitansky-Canetti10] • Functionality: • Security:

  8. Relaxed Functionality? • Functionality: • Security:

  9. Approximate Obfuscation [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01] is an approximate obfuscation of : • Functionality: • Security:

  10. Main Result Assuming trapdoor permutations, there exist families of functions that cannot be approximately obfuscated Motivation? Positive applications

  11. From Impossibility to Applications Impossibility of approximate obfuscation Non-black-box extraction Zero-knowledge with resettable security Worst-case extractable signatures

  12. Plan [BGIRSVY 01]: Impossibility of Obfuscation Unobfuscatable Functions This work: RobustUnobfuscatableFunctions Impossibility of Approximate Obfuscation Applications

  13. Unobfuscatable Functions From Barak et al. Black-box unlearnability: : Extraction:

  14. Robust UnobfuscatableFunctions Black-box unlearnability: : Robust extraction:

  15. Robust UnobfuscatableFunctions

  16. RUFs Construction

  17. UnobfuscatableFunctions Construction of Barak et al. (using FHE for simplicity) – two -bit strings - secret key for FHE

  18. UnobfuscatableFunctions

  19. Black-Box Unlearnability

  20. Extraction

  21. Robust Extraction?

  22. A Taste of the Construction Q: Find such that: Randomly reduce to with errors

  23. Getting Robustness

  24. with errors

  25. queries on and queries on

  26. Construction of RUFs

  27. Assumptions • RUFs from trapdoor permutations. • Weak RUFs from OWF only:

  28. Applications

  29. Publicly-Verifiable RUOFs iff

  30. Resettably-Sound ZK [Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01] Standard ZK Resettable Soundness

  31. Resettable Soundness [Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

  32. Resettable Soundness [Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell01]

  33. No Black-Box Simulator [Barak-Goldreich-Goldwasser-Lindell01] Resettable soundness Zero-knowledge (black-box simulator)

  34. Resettably-Sound ZK [Barak-Goldreich-Goldwasser-Lindell 01, BP 12, Chung-Pass-Seth 13] Resettable soundness Zero-knowledge (non-black-box simulator)

  35. Resettably-Sound ZK Witness indistinguishable proof: or “knows”

  36. Resettably-Sound ZK Witness indistinguishable proof: or “knows”

  37. Analysis Resettable soundness Zero-knowledge

  38. More Resettable Crypto • Resettably-sound ZK from OWFs (Different approach from Chung-Pass-Seth 13) • Simultaneously-resettable ZK from OWFs (using srWI by Chung-Ostrovsky-Pass-Visconti 13) • 4-message resettably-sound ZK • 3-message simultaneously-resettable WI proof of knowledge

  39. Worst-Case Extractable Signatures Digital Signatures:

  40. Worst-Case Extractable Signatures For every breaks security for

  41. Thank You. • #define _ -F<00||--F-OO--; • int F=00,OO=00;main(){F_OO();printf("%1.3f\n",4.*-F/OO/OO);}F_OO(){ • _-_-_-_ • _-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_-_-_-_-_ • _-_-_-_-_-_-_-_ • _-_-_-_ • } IOCCC 88

More Related