On the Impossibility of Approximate Obfuscation

Post on 25-Feb-2016

60 views 0 download

Tags:

description

On the Impossibility of Approximate Obfuscation. Nir Bitansky and Omer Paneth. Program Obfuscation. Compute . Program Obfuscation. Program Obfuscation. Sign email with If starts with โ€œomer@bu.eduโ€. Virtual Black-Box. - PowerPoint PPT Presentation

transcript

On the Impossibility of Approximate Obfuscation

Nir Bitansky and Omer Paneth

Program Obfuscation

Compute

๐‘ฅ

๐‘ฆ= ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Program Obfuscation๐‘ฅ

๐‘ฆ= ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Program Obfuscation

Sign email with If starts with

โ€œomer@bu.eduโ€

๐‘ฅ

๐‘ฆ=๐œŽ (๐‘ฅ)/โŠฅ

Virtual Black-Box

is an obfuscation of :

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Impossibility of Obfuscation

There exist families of functions that cannot be obfuscated

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Relaxed Security

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

[Barak et al. 01, Goldwasser-Rothblum07, Hofheinz-Malone-Lee-Stam07, Hohenberger-Rothblum-Shelat-Vaikuntanathan07,

Bitansky-Canetti10]

Relaxed Functionality?

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

Approximate Obfuscation[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

is an approximate obfuscation of :

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

Main ResultAssuming trapdoor permutations, there exist families of functions that cannot be approximately

obfuscatedMotivation?

Positive applications

From Impossibility to

Applications

Impossibility of approximate obfuscation

Non-black-box extraction

๐ด๐‘ ๐‘˜๐‘ฅ ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

๐‘ ๐‘˜

Zero-knowledge with

resettable security

Worst-case extractable signatures

Plan[BGIRSVY 01]:

This work:

Impossibility of Obfuscation

Impossibility of Approximate Obfuscation

Unobfuscatable Functions

Robust Unobfuscatable

Functions

Applications

Unobfuscatable Functions

๐ด๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜

๐ธ๐’ช ๐‘ ๐‘˜

1. Black-box unlearnability:

:2. Extraction: Pr๐‘ฅโ†๐‘ˆ

[๐’ช (๐‘ฅ )= ๐‘“ ๐‘ ๐‘˜ (๐‘ฅ ) ]=1โ‡’

From Barak et al.

Robust Unobfuscatable Functions

1. Black-box unlearnability:

:2. Robust extraction:

๐ด๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜

๐ธ๐’ช ๐‘ ๐‘˜Pr๐‘ฅโ†๐‘ˆ

[๐’ช (๐‘ฅ )= ๐‘“ ๐‘ ๐‘˜ (๐‘ฅ ) ]>0 .9โ‡’

Robust Unobfuscatable Functions

๐‘“ ๐‘ ๐‘˜๐’ช๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช

๐‘ ๐‘˜๐‘ ๐‘˜

๐ธ

RUFs Construction

Unobfuscatable FunctionsConstruction of Barak et al. (using FHE for simplicity)

โ€“ two -bit strings - secret key for FHE

๐‘“ ๐‘Ž ,๐‘ , ๐‘ ๐‘˜ (๐‘ฅ ) :

๐‘“ ๐‘Ž ,๐‘ , ๐‘ ๐‘˜(๐‘ฅ )ยฟ {ยฟยฟ๐‘ฅ=๐‘Ž๐‘ฅ=0๐‘›De c๐‘ ๐‘˜(๐‘ฅ)=๐‘o . w .

En c๐‘ ๐‘˜(๐‘Ž)๐‘

๐‘

โŠฅ

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

๐‘“

๐‘“

๐‘“

Unobfuscatable Functions

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

๐‘“

๐‘“

๐‘“

Black-Box Unlearnability

๐ด๐‘“๐‘

๐ถ

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

Extraction

๐ธ๐ถโ‰ก ๐‘“ ๐‘

๐ธ๐‘ฃ๐‘Ž๐‘™ (๐ถ )๐ถ๐ถ

๐ถ

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

Robust Extraction?

๐ธ

๐ถโˆ—๐ถโˆ—

๐ถโˆ— ๐‘ ๐ถโˆ—(๐‘ฅ)={ โŠฅ๐ธ๐‘›๐‘๐‘ ๐‘˜(๐‘Ž)

๐‘ฅ=๐‘Ž๐‘ฅ=0๐‘›

๐‘โŠฅ

๐ท๐‘’๐‘๐‘  ๐‘˜(๐‘ฅ )=๐‘๐‘œ .๐‘ค .

A Taste of the Construction

๐‘“ ๐‘Ž ,๐‘(๐‘ฅ)={๐‘ ๐‘ฅ=๐‘ŽโŠฅ ๐‘œ .๐‘ค .

Q: Find such that:

with errors ๐‘“ a , b

Randomly reduce to

Getting Robustness

๐‘“ ๐‘Ž ,๐‘(๐‘ฅ)={๐‘ ๐‘ฅ=๐‘ŽโŠฅ ๐‘œ .๐‘ค .

with errors ๐‘“ a , b

๐‘”h

๐‘Ž๐‘Ÿ

๐‘ŽโŠ•๐‘Ÿ โŠ•

๐‘Ÿโ†๐‘ˆ๐‘โŠ•PRF (๐‘Ÿ )

PRF (๐‘Ÿ )

๐‘“

๐‘” , h ๐‘“ a , b

๐ด๐‘” , h

๐‘

๐‘Ž ๐‘Ž queries on and queries on

Construction of RUFs

ยฟ { ๐‘๐ธ๐‘›๐‘๐‘  ๐‘˜(๐‘Ž)

๐‘ฅ=๐‘Ž๐‘ฅ=0๐‘›

๐‘โŠฅ

๐ท๐‘’๐‘๐‘ ๐‘˜(๐‘ฅ)=๐‘๐‘œ .๐‘ค .

๐‘“ ๐‘Ž ,๐‘ , ๐‘ ๐‘˜(๐‘ฅ )

โ€ข RUFs from trapdoor permutations.

โ€ข Weak RUFs from OWF only:

Assumptions

๐ธ๐’ช ๐‘ ๐‘˜

โˆ€ ๐‘ฅ :๐’ช (๐‘ฅ )โˆˆ { ๐‘“ ๐‘ ๐‘˜ (๐‘ฅ ) ,โŠฅ}

Applications

Publicly-Verifiable RUOFs

๐ด๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜ ๐ธ๐’ช ๐‘ ๐‘˜

iff

๐‘ฃ๐‘˜ ๐‘ฃ๐‘˜

๐‘ ๐‘˜,๐‘ฃ๐‘˜โ†Gen () Pr๐‘ฅโ†๐‘ˆ

[Ver๐‘ฃ๐‘˜ (๐‘ฅ ,๐’ช (๐‘ฅ ) )=1 ]> 1poly(๐‘›)

Resettably-Sound ZK[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

๐‘ฅโˆˆโ„’?๐’ซStandard ZK

ResettableSoundnes

s๐’ฑ

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

๐’ฑ๐’ซโˆ—๐‘ฅโˆ‰โ„’

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

๐’ฑ๐’ซโˆ—๐‘ฅโˆ‰โ„’๐’ฑ

No Black-Box Simulator

๐’ฑ๐’ซโˆ—

Resettable soundness Zero-knowledge(black-box simulator) ๐’ซโˆ—

๐’ฑ ๐’ฎ๐’ฑโˆ—

[Barak-Goldreich-Goldwasser-Lindell 01]

Resettably-Sound ZK

๐’ฑ๐’ซโˆ— ๐’ฎ๐’ฑโˆ—

Resettable soundness Zero-knowledge (non-black-box simulator)๐’ซโˆ—

๐’ฑ

[Barak-Goldreich-Goldwasser-Lindell 01, BP 12, Chung-Pass-Seth 13]

๐’ซ ๐’ฑResettably-Sound ZK๐‘ ๐‘˜,๐‘ฃ๐‘˜๐‘ฃ๐‘˜

๐‘ฅโ†๐‘ˆ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Witness indistinguishable proof:

or โ€œknowsโ€

๐’ซ ๐’ฑResettably-Sound ZK๐‘ ๐‘˜,๐‘ฃ๐‘˜๐‘ฃ๐‘˜๐‘ฅ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Witness indistinguishable proof:

or โ€œknowsโ€

๐’ฑ๐’ซโˆ—๐‘ฅ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Analysis

๐’ฎ ๐‘–๐‘š๐’ฑโˆ—

Resettable soundness Zero-knowledge

๐’ซโˆ—๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜

๐’ฎ๐‘ ๐‘˜

๐ธ

โ€ข Resettably-sound ZK from OWFs (Different approach from Chung-Pass-Seth 13)

โ€ข Simultaneously-resettable ZK from OWFs (using srWI by Chung-Ostrovsky-Pass-Visconti 13)

โ€ข 4-message resettably-sound ZK โ€ข 3-message simultaneously-resettable

WI proof of knowledge

More Resettable Crypto

Sign ๐‘ ๐‘˜

Sign ๐‘ ๐‘˜

๐ด๐‘š ๐‘–

๐œŽ (๐‘šยฟยฟ ๐‘–)ยฟ๐‘ฃ๐‘˜

Digital Signatures:

Worst-Case Extractable Signatures

โˆ€๐‘ ๐‘˜ ,๐‘ฃ๐‘˜

Worst-Case Extractable SignaturesFor every

breaks security for โŸน

๐ด

๐ธ๐‘ ๐‘˜

Thank You.#define _ -F<00||--F-OO--;int F=00,OO=00;main(){F_OO();printf("%1.3f\n",4.*-F/OO/OO);}F_OO(){

_-_-_-_ _-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_ _-_-_-_

}

IOCCC 88