Download presentation
Presentation is loading. Please wait.
Published byMarvin Beasley Modified over 9 years ago
1
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Mohammed Mahmoody (University of Virginia) Ameer Mohammed (University of Virginia) Soheil Nematihaji (University of Virginia) abhi shelat (University of Virginia) Rafael Pass (Cornell University)
2
Obfuscation Mechanisms
π πβ²
3
Indistinguishability Obfuscation
Next best thing? Indistinguishability Obfuscation π πβ²
4
Landscape and Goals Functional Encryption [GGH+13]
Indistinguishability Obfuscation (iO) Functional Encryption [GGH+13] PKE Oblivious Transfer KEM β¦ (Idealized) Graded Encoding Schemes [SW14] [BR14, BGK+14,PST14, GLSW14] Talk about [AS15] negative result for pFE -> iO(C^f) later Multilinear Maps (+LWE) [GGH+13]
5
What assumptions give us iO? Can we use βstandard assumptionsβ?
Computational assumption necessary for result 1 Say that they are informal statements
6
Landscape and Goals OWF CRHF TDP⦠Indistinguishability Obfuscation
Functional Encryption [GGH+13] ??? PKE Oblivious Transfer KEM β¦ (Idealized) Graded Encoding Schemes [SW14] [BR14, BGK+14,PST14, GLSW14] Talk about [AS15] negative result for pFE -> iO(C^f) later Multilinear Maps (+LWE) [GGH+13]
7
Main results in this talk
If NP β coNP then iO cannot be constructed from OWFs or CRHs in a black-box way Result 2 For any primitive π that can be black-box obtained from π« : if π β blackβbox iO then OWF β constructive PKE Computational assumption necessary for result 1 Say that they are informal statements π«: Generic Group Model Graded Encoding Model Random TDP Model
8
Indistinguishability Obfuscation (iO)
πΆ 0 πΆ 1 β‘ Obfuscator Obfuscator πΆ 0 πΆ 0 β² πΆ 1 β² πΆ 1 β‘ β π β‘ A Pr π π π πΆ β‘πΆ =1
9
Approx. Indistinguishability Obfuscation (π-iO)
πΆ 0 πΆ 1 β‘ Obfuscator Obfuscator πΆ 0 πΆ 0 β² πΆ 1 β² πΆ 1 β β π β A Pr π,π₯ π π πΆ π₯ β πΆ π₯ β€π (π)
10
Overview of Techniques
VBB Obfuscation (Not covered in this Talk) Indistinguishability Obfuscation ππ π π©π¨π₯π²βπππ πππ [BR13] π’π π©π¨π₯π²βπππ πππ ππ π π π βπππ πππ (This Talk) π’π π π βπππ πππ [MMN15,Ps15] Approx. πππ Impossible [BP13] ππ π πππ PKC from OWF π’π πππ ππ π πππ π’π πππ [CKP15] ππ π ππ π’π ππ ππ=ππ¨ππ (This Talk) πππ Impossible [BKI+01]
11
Fully Black-Box (BB) Construction of iO [IR89, RTV04]
A fully BB construction of iO from π« consists of two PPT oracle algorithms (π,π): Primitive π« Construction π π π π Correctness: β π, circuits πΆ: Pr π π πΆ β‘πΆ =1 Security: β π,π΄, if for infinite pairs of equivalent circuits ( πΆ 0 , πΆ 1 ): Pr π΄ π΅ =π;π $ 0,1 ,π΅βπ( πΆ π ) β₯ ππππ¦(π) Then: π π΄,π breaks the security of π π π΄,π π΄ Security Reduction π Adversary π΄
12
Semi-Black-Box Construction of iO (RTV04)
A semi-BB construction of iO from π« consists of two PPT oracle algorithms (π,π): Primitive π« Construction π π π π Correctness: β π, circuits πΆ: Pr π π πΆ β‘πΆ =1 Security: β π,π΄, if for infinite pairs of equivalent circuits ( πΆ 0 , πΆ 1 ): Pr π΄ π΅ =π;π $ 0,1 ,π΅βπ( πΆ π ) β₯ ππππ¦(π) Then: π π΄,π breaks the security of π π π (π΄) π΄ Security Reduction π Efficient Adversary π΄
13
Black-Box Separation of iO from OWF
Known constructions that use iO as a primitive yield non-black-box constructions naturally. Still meaningful to explore whether we can get black-box constructions of iO. Analogy: ZK Proofs for polynomial size circuits
14
Main Result 1: iO in RO Model βNP β coNP
Theorem 1 If NP β coNP then iO can be broken in the random oracle model. So if π that can be obtained (in black-box way) from Random Oracle then: π β π΅π΅ iO Note: Perfect completeness necessary here Corollary: iO from (OWF/CRHF) βNP β coNP OWP (for large enough n?)
15
Main Result 1: iO in RO Model βππ collapse
Lemma 1 For PPT π, then β( πΆ 0 , πΆ 1 ) either: Distinguish: There exists poly-query π΄ that can distinguish between π( πΆ 0 ) and π πΆ 1 Or Witness: There exists a way to obfuscate πΆ 0 and πΆ 1 into the same circuit πΆβ² ο a βproof/witnessβ that πΆ 0 β‘ πΆ 1 Typo: you assumed equivalence. Note that if Case 2 happens then C0 MUST be equiv to C1. If C1 \neq C0, Case 2 cannot happen by PERFECT completeness of iO Two circuits equivalent: coNP-complete
16
Main Result 1: iO in RO Model βππ collapse
Corollary of Lemma 1 For PPT π, either: Distinguish: There exists poly-query π΄ and infinite sequence πΆ 0 π , πΆ 1 π π where πΆ 0 π β‘ πΆ 1 π s.t. for all π,π΄ can distinguish between π( πΆ 0 π ) and π πΆ 1 π , Or Witness: For all but a finite number of pairs of equivalent πΆ 0 π , πΆ 1 π π there exists a βshortβ witness that shows πΆ 0 π β‘ πΆ 1 π . Thus NP = coNP.
17
Main Result 1: iO in RO Model βππ collapse
Proof of Lemma 1: Distinguish or Witness Follows from [MP12] Case 1: π΄ π πΆ 0 , πΆ 1 , π π π πΆ π learns likely queries of π π and try to guess π If π=0 more probable or π=1 more probable ο A could guess b well ( πΆ 0 , πΆ 1 ) ( πΆ 0 , πΆ 1 ) π π π π π π πΆ π π΄ π NIC in ROM but will rephrase the proof to be in context of iO
18
Main Result 1: iO in RO Model βππ collapse
Proof of Lemma 1: Distinguish or Witness Follows from [MP12] Case 2: π΄ π πΆ 0 , πΆ 1 , π π π πΆ π learns likely queries of π π and try to guess π Both π=0 and π=1 have at least π chance of being chosen by πππ ( πΆ 0 , πΆ 1 ) ( πΆ 0 , πΆ 1 ) π π π π π π πΆ π π΄ π NIC in ROM but will rephrase the proof to be in context of iO ο We can sample oracle f and Obf( πΆ 0 )=Obf( πΆ 1 )
19
Main Result 1: iO in RO Model βππ collapse
Proof of Theorem 1 using Lemma 1 Assume NP β coNP and let π be OWF By Lemma 1, there exists (computationally unbounded) poly-query π΄ and πΆ 0 π , πΆ 1 π π where πΆ 0 π β‘ πΆ 1 π s.t. for all π: Pr π΄ π΅ =π;π $ 0,1 ,π΅β π(πΆ π π ) β₯1β 1 ππππ¦ π
20
Main Result 1: iO in RO Model βππ collapse
(Contd.) Proof of Theorem 1 using Lemma 1 By definition of fully BB, security reduction + poly-query attacker, together break one-wayness of random function (which is trivially impossible).
21
Main Result 2: iO from π« β PKE from OWF
Random (Ideal) TDP Model (RTP) Generic Group Model (GGM) π(1)-degree Generic Encoding Model (GEM) Theorem 2 For any primitive π that can be obtained (in βBB wayβ) from βIdeal Modelβ π«, if πβiO then OWF β PKE This is not an impossibility result, and simply says that if P => iO then you might as well have found a construction of PKE from OWF (not BB so IR result does not apply here).
22
Main Result 2: iO from π«β PKE from OWF
Approximately correct and approximately secure π π π« [MMN15, PS15] πβππ Approx. PKE [Hol14] PKE OWF
23
OWF + π-iO β approx. PKE Follows from [SW14] construction:
πΊππ 1 π : ππ=ππ( πΉ π ) π π=π πΈππ π;π : ( π 1 , π 2 )βππ π,π π·ππ π π,π : π= π 2 βππ
πΉ π, π 1 πΉ π π,π β ππ
πΊ π ,ππ
πΉ π,ππ
πΊ π βπ Note that security does not rely on correctness of ππ Security is proved in [SW14] by showing that: ππ, πΉ π π,0 and ππ, πΉ π π,1 are indistinguishable by PPT adversaries
24
OWF + π-iO β approx. PKE Follows from [SW14] construction:
πΊππ 1 π : ππ=πβππ( πΉ π ) π π=π πΈππ ππ,π;π : ( π 1 , π 2 )βππ π,π π·ππ π π,π : π= π 2 βππ
πΉ π, π 1 πΉ π π,π β ππ
πΊ π ,ππ
πΉ π,ππ
πΊ π βπ
25
Pr π,π π·ππ π π,πΈππ ππ,π =π;ππβπππ πΉ π β₯1β π
OWF + π-iO β approx. PKE Approx. correctness: By approx. correctness of πβππ, Pr π,π π·ππ π π,πΈππ ππ,π =π;ππβπππ πΉ π β₯1β π Approx. security: By approx. correctness of πβππ, ππ, πΉ π π,0 β π ππ,π πΉ π π,0 ππ, πΉ π π,1 β π ππ,π πΉ π π,1 Thus, if original ππ provides β€ 1 2 +ππππ π security then πππ provides β€ 1 2 +ππππ π +π security
26
Main Result 2: iO from π«β PKE from OWF
Approximately correct and approximately secure π π π« [MMN15, PS15] πβππ Approx. PKE [Hol14] PKE OWF
27
Conclusion 1. Constructing iO from OWFs and CRHs is not possible unless NP=coNP 2. Constructing iO from almost all βclassical primitivesβ in Crypto is βextremely hardβ : as hard as basing public-key enc on private-key enc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.