Download presentation
Presentation is loading. Please wait.
Published byGrant Marshall Modified over 8 years ago
1
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2
Program Obfuscation Obfuscated Program Approved Document Signature Obfuscation Verify and sign
3
Virtual Black-Box (VBB) [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]
4
Impossibilities for VBB [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]
5
Positive results Constructions for simple functions [Can97, CMR98, LPS04, DS05,Wee05, CD08, CV09, CRV10,BR13] General constructions in idealized models [CV13,BR13,BGKPS13]
6
Which functions are VBB obfuscatable? Find rich classes of functions that can be VBB obfuscated
7
Evasive Functions
8
Applications Evasive Functions Point functions Digital Lockers Fuzzy point functions DisjunctionsHyperplanes
9
Example Buggy software Bad input Crash Good input Output Patch Error message Bad input Input
10
No impossibility for VBB obfuscation* of evasive functions *for the right notion of VBB
11
VBB for Evasive Functions Turing machine Circuit Worst-case Average-case Impossible No known impossibility
12
Contributions
14
Average-case VBB
15
Input-Hiding Obfuscation Only achievable for evasive functions Incomparable to average-case VBB
17
Constructions Average-case VBB and Input-hiding obfuscation for a subclass of evasive function:
18
Is the Root Set Evasive?
19
Two Constructions Security notion Function families Assumption Input-hiding Average-case VBB One-way graded encoding Perfectly-hiding graded encoding
20
Graded Encodings [Garg-Gentry-Halevi 13]
21
Input-Hiding Zero
22
Proof Idea
24
Virtual Grey-Box (VGB) [Bitansky-Canetti 10] Computationally unbounded Polynomial # of queries
25
Why VGB?
26
Applications of VGB [Bitansky-Canetti 10]
27
Virtual Grey-Box Virtual grey-box is not always meaningful. Example: pseudorandom functions For what functions is virtual grey-box meaningful?
28
VGB for Evasive Functions Computationally unbounded Polynomial # of queries
29
Theorem + indistinguishability obfuscation for all functions
30
Proof Idea Can be learned by the VGB simulator Evasive
31
Decomposition via Learning
37
Thank You!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.