Download presentation
Presentation is loading. Please wait.
Published byNoel Cook Modified over 6 years ago
1
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Mohammad Mahmoody (University of Virginia) Ameer Mohammed (University of Virginia) Soheil Nematihaji (University of Virginia) abhi shelat (University of Virginia) Rafael Pass (Cornell University)
2
VBB Obfuscation [BGIRSVY01] VBB not possible in general
[Hada00, BGIRSVY01] Ideal: VBB obfuscation. VBB Obfuscation π πβ² [BGIRSVY01] VBB not possible in general [CPK15,MMN15,Ps15] Not even in some idealized models
3
Indistinguishability Obfuscation
Next best thing? Indistinguishability Obfuscation π πβ² [GGHRSW13] Candidate iO
4
Applications and Related Results of iO
Functional Encryption: [Garg-Gentry-Halevi-Raykova-Sahai-Waters 2013] Witness Encryption: [Garg-Gentry-Sahai-Waters 2013] 2-round MPC: [Garg-Gentry-Halevi-Raykova 2013] Re-using garbled circuits: [GentryβHaleviβRaykova-Wichs 2014] Deniable Encryption, KEM, Oblivious Transfer,β¦: [Sahai-Waters 2014] Random oracle instantiation: [Hohenberger-Sahai-Waters 2014] Secret sharing: [Komargodski-Naor 2014] 2-round adaptively-secure MPC: [Garg-Polychroniadou 2015] Multi-input Functional Encryption: [Goldwasser-Gordon-Goyal-Jain-Katz-Liu-Sahai-Shi-Zhao 2015] β¦β¦β¦.. β¦ Indistinguishability Obfuscation
5
Indistinguishability Obfuscation (iO)
πΆ 0 πΆ 1 β‘ Obfuscator Obfuscator πΆ 0 πΆ 0 β² πΆ 1 β² πΆ 1 β‘ β π β‘ A Perfect Completeness Pr π π π πΆ β‘πΆ =1
6
Landscape Functional Encryption [GGH+13]
Indistinguishability Obfuscation (iO) Functional Encryption [GGH+13] PKE Oblivious Transfer KEM β¦ (Idealized) Graded Encoding Schemes [SW14] [BR14, BGK+14,PST14, GLSW14] Attacks on MLM Black-box CRHF FHE Multilinear Maps (+LWE) [AS15] [GGH+13]
7
What assumptions give us iO? Can we use βstandard assumptionsβ?
8
Landscape and Goals OWF CRHF TDP⦠Indistinguishability Obfuscation
Functional Encryption [GGH+13] ??? PKE Oblivious Transfer KEM β¦ (Idealized) Graded Encoding Schemes [SW14] [BR14, BGK+14,PST14, GLSW14] CRHF FHE Multilinear Maps (+LWE) [AS15] [GGH+13]
9
Main results in this talk
If NP β coNP then iO cannot be constructed from OWFs or CRHs in a black-box way Result 2 For any primitive π that can be black-box obtained from π« : if π β blackβbox iO then OWF β constructive PKE Result 1: NP != coNP => (OWF =/=> iO) Result 2: (OWF =/=> PKE) => (P =/=> iO) Computational assumption necessary for result 1 Say that they are informal statements Talk about [AS15] negative result for pFE -> iO(C^f) Constructive (construction/security reduction allowed to be non-black box) π«: Generic Group Model π 1 βdegree Graded Encoding Model Random TDP Model
10
Fully Black-Box (BB) Construction of iO [IR89, RTV04]
A fully BB construction of iO from π« consists of two PPT oracle algorithms (π,π): Note: plain-model circuits Primitive π« Construction π π π π (πΆ) Correctness: β π, circuits πΆ: Pr π π πΆ β‘πΆ =1 Security: β π,π΄, if for infinite pairs of equivalent circuits ( πΆ 0 , πΆ 1 ): Pr π΄ π΅ =π;π $ 0,1 ,π΅βπ( πΆ π ) β₯ ππππ¦(π) Then: π π΄,π breaks the security of π π π΄,π π΄ Security Reduction π Adversary π΄
11
Main Result 1: iO in RO Model βNP = coNP
Theorem 1 If NP β coNP then iO can be broken in the random oracle model. So if π that can be obtained (in black-box way) from Random Oracle then: π β π΅π΅ iO Corollary: iO from (OWF/CRHF) βNP = coNP Note: Our result relies heavily on perfect completeness OWP (for large enough n?)
12
Main Result 1: iO in RO Model βNP = coNP
Lemma 1 For PPT iO π, β( πΆ 0 , πΆ 1 ) where πΆ 0 = πΆ 1 =π, either: Distinguish: There exists poly(π)-query π΄ (in the RO model) that can distinguish between π( πΆ 0 ) and π πΆ 1 with probability β 1, Or Witness: There exists a way to obfuscate πΆ 0 and πΆ 1 into the same circuit πΆβ² ο a βproof/witnessβ that πΆ 0 β‘ πΆ 1 Typo: you assumed equivalence. Note that if Case 2 happens then C0 MUST be equiv to C1. If C1 \neq C0, Case 2 cannot happen by PERFECT completeness of iO Two circuits equivalent: coNP-complete
13
Main Result 1: iO in RO Model βNP =coNP
Corollary of Lemma 1 For PPT π, either: Distinguish: There exists poly(π)-query π΄ and infinite sequence πΆ 0 π , πΆ 1 π π where πΆ 0 π β‘ πΆ 1 π and πΆ 0 π = πΆ 1 π =π s.t. for all π,π΄ can distinguish between π( πΆ 0 π ) and π πΆ 1 π , Or Witness: For all but a finite number of pairs of equivalent πΆ 0 π , πΆ 1 π π there exists a βshortβ witness that shows πΆ 0 π β‘ πΆ 1 π . Thus NP = coNP.
14
Main Result 1: iO in RO Model βNP = coNP
Proof of Lemma 1: Distinguish or Witness Follows from [MP12] Case 1: π΄ π πΆ 0 , πΆ 1 , π π π πΆ π learns likely queries π of π π and try to guess π π΄ could guess π with probability close to 1 ( πΆ 0 , πΆ 1 ) ( πΆ 0 , πΆ 1 ) π π π π π π πΆ π π΄ π NIC in ROM but will rephrase the proof to be in context of iO
15
Main Result 1: iO in RO Model βNP = coNP
Proof of Lemma 1: Distinguish or Witness Follows from [MP12] Case 2: π΄ π πΆ 0 , πΆ 1 , π π π πΆ π learns likely queries π of π π and try to guess π ( πΆ 0 , πΆ 1 ) ( πΆ 0 , πΆ 1 ) π π π π π π πΆ π =πΆβ² π΄ π β π 0 , π 1 : π π 0 πΆ 0 = π π 1 πΆ 1 =πΆβ² Consistent with π NIC in ROM but will rephrase the proof to be in context of iO By perfect completeness
16
Main Result 1: iO in RO Model βNP = coNP
Proof of Theorem 1 using Lemma 1 Assume NP β coNP and let π be OWF By Lemma 1, there exists (computationally unbounded) poly-query π΄ and πΆ 0 π , πΆ 1 π π where πΆ 0 π β‘ πΆ 1 π s.t. for all π: Pr π΄ π΅ =π;π $ 0,1 ,π΅β π(πΆ π π ) β1
17
Main Result 1: iO in RO Model βNP = coNP
(Contd.) Proof of Theorem 1 using Lemma 1 OWF π β΄ππβ ππ¨ππβ OWF β π΅π΅ iO By definition of BB π π΄ poly-query attacker that breaks security of OWF! π π΄ Security Reduction π (poly-query) Adversary π΄
18
Main Result 2: iO from π« β PKE from OWF
Random (Ideal) TDP Model (RTP) Generic Group Model (GGM) π(1)-degree Graded Encoding Model (GEM) Theorem 2 For any primitive π that can be obtained (βBlack-Box wayβ) from βIdeal Modelβ π«, if πβiO then OWF β PKE This is not an impossibility result, and simply says that if P => iO then you might as well have found a construction of PKE from OWF (not BB so IR result does not apply here).
19
Indistinguishability Obfuscation (iO)
πΆ 0 πΆ 1 β‘ Obfuscator Obfuscator πΆ 0 πΆ 0 β² πΆ 1 β² πΆ 1 β‘ β π β‘ A Pr π π π πΆ β‘πΆ =1
20
Approx. Indistinguishability Obfuscation (π-iO)
πΆ 0 πΆ 1 β‘ Obfuscator Obfuscator πΆ 0 πΆ 0 β² πΆ 1 β² πΆ 1 β π β π β π A Pr π,π₯ π π πΆ π₯ β πΆ π₯ β€π (π)
21
Main Result 2: iO from π«β PKE from OWF
Approximately correct and approximately secure [MMN15, Ps15] (Previous talk) π π π« πππ [SW14, BV15] Approx. PKE [DNR04, Hol06] PKE OWF
22
OWF + iO β PKE [SW14] PKE construction: π π=π Obfuscator ππ
πΈππ π π,π β ππ
πΊ π ,ππ
πΉ π,ππ
πΊ π βπ π πΈππ π ππ π π¬ππππππ ππ,π;π : π πΈππ π π=( π 1 , π 2 ) π π π«ππππππ ππ,π : ππ
πΉ π, π 1 β π 2 π π
23
OWF + π-iO β PKE Follows from [SW14] construction: π π=π π-iO ππ
πΈππ π π,π β ππ
πΊ π ,ππ
πΉ π,ππ
πΊ π βπ π πΈππ π ππ π π¬ππππππ ππ,π;π : π πΈππ π π=( π 1 , π 2 ) π π π«ππππππ ππ,π : ππ
πΉ π, π 1 β π 2 π π
24
Pr π,π π·ππππ¦ππ‘ π π,πΈππππ¦ππ‘ ππ,π =π;ππβπππ πΈππ π β₯1β π
OWF + πiO β approx. PKE Approx. correctness: By approx. correctness of πππ, Pr π,π π·ππππ¦ππ‘ π π,πΈππππ¦ππ‘ ππ,π =π;ππβπππ πΈππ π β₯1β π Approx. security: By approx. correctness of πππ, ππ, πΈππ π π,0 β π ππ,π πΈππ π π,0 ππ, πΈππ π π,1 β π ππ,π πΈππ π π,1 Thus, if original ππ provides β€ 1 2 +ππππ π security then πππ provides β€ 1 2 +ππππ π +π security
25
Relating Result 2 to [BV15]
ππΎπΈ [MMN15, Ps15] (Previous talk) π π π« πππ ππ [BV15] ππ πΎπΈπ DDH/sub-exp PPRF OWF πΉπΈ
26
Conclusion Constructing iO from OWFs and CRHs is not possible unless NP=coNP Constructing iO from almost all βclassical primitivesβ in Crypto is βextremely hardβ : as hard as basing public-key enc. on private-key enc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.