On the Impossibility of Approximate Obfuscation
In this study, the authors delve into the challenging realm of approximate obfuscation, shedding light on its complexities and limitations. The exploration of program obfuscation, virtual black-box constructions, and the implications of relaxed security and functionality reveal foundational insights into the boundaries of obfuscation techniques. This journey from understanding the impossibility of obfuscation to its practical applications uncovers a fascinating landscape of cryptographic research.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
On the Impossibility of Approximate Obfuscation Nir Bitansky and Omer Paneth
Program Obfuscation ? Compute ???(?) ? = ???(?)
Program Obfuscation ? ? = ???(?)
Program Obfuscation ? Sign email ? with ?? If ? starts with omer@bu.edu ? = ?(?)/
Virtual Black-Box [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01] ??? is an obfuscation of ???: - Functionality: ?,???? = ???? - Security: ??? ? ? ???
Impossibility of Obfuscation There exist families of functions that cannot be obfuscated [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]
Relaxed Security [Barak et al. 01, Goldwasser-Rothblum07, Hofheinz-Malone-Lee-Stam07, Hohenberger-Rothblum-Shelat-Vaikuntanathan07, Bitansky-Canetti10] - Functionality: ?,???? = ???? - Security: ??? ? ? ???
Relaxed Functionality? - Functionality: ?,???? = ???? - Security: ??? ? ? ???
Approximate Obfuscation [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01] ??? is an approximate obfuscation of ???: - Functionality: Pr - Security: ? ????? = ???? > 0.9 ??? ? ? ???
Main Result Assuming trapdoor permutations, there exist families of functions that cannot be approximately obfuscated Motivation? Positive applications
From Impossibility to Applications Impossibility of approximate obfuscation Non-black-box extraction ?? Zero-knowledge with Worst-case ??? ? ???(?) resettable security extractable signatures
Plan [BGIRSVY 01]: Impossibility of Obfuscation Unobfuscatable Functions This work: Impossibility of Approximate Obfuscation Robust Unobfuscatable Functions Applications
Unobfuscatable Functions From Barak et al. ??? 1. Black-box unlearnability: efficient ?, ?? ?: ? ?? 2. Extraction: efficient ?, ?,??: ?? Pr ? ?? ? = ???? = 1 ? ?
Robust Unobfuscatable Functions ??? 1. Black-box unlearnability: efficient ?, ?? ?: ? ?? 2. Robust extraction: efficient ?, ?,??: ?? Pr ? ?? ? = ???? > 0.9 ? ?
Robust Unobfuscatable Functions 90% ? ??? ??? ? ? ? ? ?? ??
Unobfuscatable Functions Construction of Barak et al. (using FHE for simplicity) ??,?,??? : ?,? two ?-bit strings ?? - secret key for FHE
Unobfuscatable Functions 0? ??? ? ??? b ? ? ? ? ? ? ? = ? ? = 0? Dec??(?) = ? o.w. Enc??(?) ? ??,?,??(?)=
Black-Box Unlearnability 0? ??? ? ??? b ? ? ? ? ? ? ? ?
Extraction 0? ??? ? ??? b ? ????(?) ? ? ? ? ? ? ? ? ?
Robust Extraction? 0? ??? ? ??? b ? ? ? ? ? = ? ? = 0? ?????(?) = ? ?.?. ?????(?) ? ? ? ? ? (?) =
A Taste of the Construction ??,?(?) = ? ? = ? ?.?. Q: Find ? such that: Randomly reduce ? to ? ? with 10% errors ?a,b
Getting Robustness ??,?(?) = ? ? = ? ?.?. ??,?,?? = ? PRF?? ?,?,?? = PRF?? ?
? ? ? ? PRF(?) ? ? ? ? ? ? PRF(?) (?.?.0.8) ?, with 10% errors ??,?,?? = ? PRF?? ?a,b ?,?,?? = PRF?? ?
?, ? queries ? on ? and ? ? ? ? queries on ? ? ? ??,?,?? = ? PRF?? ?a,b ?, ?,?,?? = PRF?? ?
Construction of RUFs ? = ? ? = 0? ?????(?) = ? ?.?. ? ?????(?) ? ??,?,??(?) =
Assumptions RUFs from trapdoor permutations. Weak RUFs from OWF only: ?: ? ? ???? , ? ?? ?
Publicly-Verifiable RUOFs ??,?? Gen() Ver???,? = 1 iff ? = ???(?) ?? ?? ??? ?? ? ?? ? ? 1 Pr ? ?Ver???,? ? = 1 > ??,?? Gen() poly(?)
Resettably-Sound ZK [Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01] ? ? Standard ZK Resettable Soundness ? ?
Resettable Soundness [Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01] ? ? ?
Resettable Soundness [Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01] ? ? ? ?
No Black-Box Simulator [Barak-Goldreich-Goldwasser-Lindell 01] Resettable soundness Zero-knowledge (black-box simulator) ? ? ? ? ? ?
Resettably-Sound ZK [Barak-Goldreich-Goldwasser-Lindell 01, BP 12, Chung-Pass-Seth 13] Resettable soundness Zero-knowledge (non-black-box simulator) ? ? ? ? ? ?
Resettably-Sound ZK ?? ??,?? ? ? ???(?) ? ? Witness indistinguishable proof: ? or? knows ??
Resettably-Sound ZK ?? ??,?? ? ???(?) ? ? Witness indistinguishable proof: ? or? knows ??
Analysis Resettable soundness Zero-knowledge ??? ? ? ??? ?.?. ? ? ? ??? ? ???(?) 1 ? p ? ? ?? ??
More Resettable Crypto Resettably-sound ZK from OWFs (Different approach from Chung-Pass-Seth 13) Simultaneously-resettable ZK from OWFs (using srWI by Chung-Ostrovsky-Pass-Visconti 13) 4-message resettably-sound ZK 3-message simultaneously-resettable WI proof of knowledge
Worst-Case Extractable Signatures Digital Signatures: ??,?? Sign?? Sign?? ? ?,? ? , ? ?? ??
Worst-Case Extractable Signatures For every ??,??: ? ? breaks security for ??,?? ? ??
Thank You. #define _ -F<00||--F-OO--; int F=00,OO=00;main(){F_OO();printf("%1.3f\n",4.*-F/OO/OO);}F_OO(){ _-_-_-_ _-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_ _-_-_-_ } IOCCC 88