+ All Categories
Home > Documents > On the Impossibility of Approximate Obfuscation

On the Impossibility of Approximate Obfuscation

Date post: 25-Feb-2016
Category:
Upload: fisseha
View: 60 times
Download: 0 times
Share this document with a friend
Description:
On the Impossibility of Approximate Obfuscation. Nir Bitansky and Omer Paneth. Program Obfuscation. Compute . Program Obfuscation. Program Obfuscation. Sign email with If starts with โ€œ[email protected]โ€. Virtual Black-Box. - PowerPoint PPT Presentation
Popular Tags:
41
On the Impossibility of Approximate Obfuscation Nir Bitansky and Omer Paneth
Transcript
Page 1: On the Impossibility of Approximate Obfuscation

On the Impossibility of Approximate Obfuscation

Nir Bitansky and Omer Paneth

Page 2: On the Impossibility of Approximate Obfuscation

Program Obfuscation

Compute

๐‘ฅ

๐‘ฆ= ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Page 3: On the Impossibility of Approximate Obfuscation

Program Obfuscation๐‘ฅ

๐‘ฆ= ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Page 4: On the Impossibility of Approximate Obfuscation

Program Obfuscation

Sign email with If starts with

โ€œ[email protected]โ€

๐‘ฅ

๐‘ฆ=๐œŽ (๐‘ฅ)/โŠฅ

Page 5: On the Impossibility of Approximate Obfuscation

Virtual Black-Box

is an obfuscation of :

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Page 6: On the Impossibility of Approximate Obfuscation

Impossibility of Obfuscation

There exist families of functions that cannot be obfuscated

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Page 7: On the Impossibility of Approximate Obfuscation

Relaxed Security

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

[Barak et al. 01, Goldwasser-Rothblum07, Hofheinz-Malone-Lee-Stam07, Hohenberger-Rothblum-Shelat-Vaikuntanathan07,

Bitansky-Canetti10]

Page 8: On the Impossibility of Approximate Obfuscation

Relaxed Functionality?

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

Page 9: On the Impossibility of Approximate Obfuscation

Approximate Obfuscation[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

is an approximate obfuscation of :

- Functionality:

๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช๐‘ ๐‘˜

- Security:

Page 10: On the Impossibility of Approximate Obfuscation

Main ResultAssuming trapdoor permutations, there exist families of functions that cannot be approximately

obfuscatedMotivation?

Positive applications

Page 11: On the Impossibility of Approximate Obfuscation

From Impossibility to

Applications

Impossibility of approximate obfuscation

Non-black-box extraction

๐ด๐‘ ๐‘˜๐‘ฅ ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

๐‘ ๐‘˜

Zero-knowledge with

resettable security

Worst-case extractable signatures

Page 12: On the Impossibility of Approximate Obfuscation

Plan[BGIRSVY 01]:

This work:

Impossibility of Obfuscation

Impossibility of Approximate Obfuscation

Unobfuscatable Functions

Robust Unobfuscatable

Functions

Applications

Page 13: On the Impossibility of Approximate Obfuscation

Unobfuscatable Functions

๐ด๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜

๐ธ๐’ช ๐‘ ๐‘˜

1. Black-box unlearnability:

:2. Extraction: Pr๐‘ฅโ†๐‘ˆ

[๐’ช (๐‘ฅ )= ๐‘“ ๐‘ ๐‘˜ (๐‘ฅ ) ]=1โ‡’

From Barak et al.

Page 14: On the Impossibility of Approximate Obfuscation

Robust Unobfuscatable Functions

1. Black-box unlearnability:

:2. Robust extraction:

๐ด๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜

๐ธ๐’ช ๐‘ ๐‘˜Pr๐‘ฅโ†๐‘ˆ

[๐’ช (๐‘ฅ )= ๐‘“ ๐‘ ๐‘˜ (๐‘ฅ ) ]>0 .9โ‡’

Page 15: On the Impossibility of Approximate Obfuscation

Robust Unobfuscatable Functions

๐‘“ ๐‘ ๐‘˜๐’ช๐‘†๐‘“ ๐‘ ๐‘˜๐ด โ‰ˆ๐’ช

๐‘ ๐‘˜๐‘ ๐‘˜

๐ธ

Page 16: On the Impossibility of Approximate Obfuscation

RUFs Construction

Page 17: On the Impossibility of Approximate Obfuscation

Unobfuscatable FunctionsConstruction of Barak et al. (using FHE for simplicity)

โ€“ two -bit strings - secret key for FHE

๐‘“ ๐‘Ž ,๐‘ , ๐‘ ๐‘˜ (๐‘ฅ ) :

Page 18: On the Impossibility of Approximate Obfuscation

๐‘“ ๐‘Ž ,๐‘ , ๐‘ ๐‘˜(๐‘ฅ )ยฟ {ยฟยฟ๐‘ฅ=๐‘Ž๐‘ฅ=0๐‘›De c๐‘ ๐‘˜(๐‘ฅ)=๐‘o . w .

En c๐‘ ๐‘˜(๐‘Ž)๐‘

๐‘

โŠฅ

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

๐‘“

๐‘“

๐‘“

Unobfuscatable Functions

Page 19: On the Impossibility of Approximate Obfuscation

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

๐‘“

๐‘“

๐‘“

Black-Box Unlearnability

๐ด๐‘“๐‘

Page 20: On the Impossibility of Approximate Obfuscation

๐ถ

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

Extraction

๐ธ๐ถโ‰ก ๐‘“ ๐‘

๐ธ๐‘ฃ๐‘Ž๐‘™ (๐ถ )๐ถ๐ถ

๐ถ

Page 21: On the Impossibility of Approximate Obfuscation

0๐‘› ๐ธ๐‘›๐‘ (๐‘Ž) ๐ธ๐‘›๐‘ (b )

๐‘Ž ๐‘

Robust Extraction?

๐ธ

๐ถโˆ—๐ถโˆ—

๐ถโˆ— ๐‘ ๐ถโˆ—(๐‘ฅ)={ โŠฅ๐ธ๐‘›๐‘๐‘ ๐‘˜(๐‘Ž)

๐‘ฅ=๐‘Ž๐‘ฅ=0๐‘›

๐‘โŠฅ

๐ท๐‘’๐‘๐‘  ๐‘˜(๐‘ฅ )=๐‘๐‘œ .๐‘ค .

Page 22: On the Impossibility of Approximate Obfuscation

A Taste of the Construction

๐‘“ ๐‘Ž ,๐‘(๐‘ฅ)={๐‘ ๐‘ฅ=๐‘ŽโŠฅ ๐‘œ .๐‘ค .

Q: Find such that:

with errors ๐‘“ a , b

Randomly reduce to

Page 23: On the Impossibility of Approximate Obfuscation

Getting Robustness

๐‘“ ๐‘Ž ,๐‘(๐‘ฅ)={๐‘ ๐‘ฅ=๐‘ŽโŠฅ ๐‘œ .๐‘ค .

Page 24: On the Impossibility of Approximate Obfuscation

with errors ๐‘“ a , b

๐‘”h

๐‘Ž๐‘Ÿ

๐‘ŽโŠ•๐‘Ÿ โŠ•

๐‘Ÿโ†๐‘ˆ๐‘โŠ•PRF (๐‘Ÿ )

PRF (๐‘Ÿ )

๐‘“

Page 25: On the Impossibility of Approximate Obfuscation

๐‘” , h ๐‘“ a , b

๐ด๐‘” , h

๐‘

๐‘Ž ๐‘Ž queries on and queries on

Page 26: On the Impossibility of Approximate Obfuscation

Construction of RUFs

ยฟ { ๐‘๐ธ๐‘›๐‘๐‘  ๐‘˜(๐‘Ž)

๐‘ฅ=๐‘Ž๐‘ฅ=0๐‘›

๐‘โŠฅ

๐ท๐‘’๐‘๐‘ ๐‘˜(๐‘ฅ)=๐‘๐‘œ .๐‘ค .

๐‘“ ๐‘Ž ,๐‘ , ๐‘ ๐‘˜(๐‘ฅ )

Page 27: On the Impossibility of Approximate Obfuscation

โ€ข RUFs from trapdoor permutations.

โ€ข Weak RUFs from OWF only:

Assumptions

๐ธ๐’ช ๐‘ ๐‘˜

โˆ€ ๐‘ฅ :๐’ช (๐‘ฅ )โˆˆ { ๐‘“ ๐‘ ๐‘˜ (๐‘ฅ ) ,โŠฅ}

Page 28: On the Impossibility of Approximate Obfuscation

Applications

Page 29: On the Impossibility of Approximate Obfuscation

Publicly-Verifiable RUOFs

๐ด๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜ ๐ธ๐’ช ๐‘ ๐‘˜

iff

๐‘ฃ๐‘˜ ๐‘ฃ๐‘˜

๐‘ ๐‘˜,๐‘ฃ๐‘˜โ†Gen () Pr๐‘ฅโ†๐‘ˆ

[Ver๐‘ฃ๐‘˜ (๐‘ฅ ,๐’ช (๐‘ฅ ) )=1 ]> 1poly(๐‘›)

Page 30: On the Impossibility of Approximate Obfuscation

Resettably-Sound ZK[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

๐‘ฅโˆˆโ„’?๐’ซStandard ZK

ResettableSoundnes

s๐’ฑ

Page 31: On the Impossibility of Approximate Obfuscation

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

๐’ฑ๐’ซโˆ—๐‘ฅโˆ‰โ„’

Page 32: On the Impossibility of Approximate Obfuscation

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

๐’ฑ๐’ซโˆ—๐‘ฅโˆ‰โ„’๐’ฑ

Page 33: On the Impossibility of Approximate Obfuscation

No Black-Box Simulator

๐’ฑ๐’ซโˆ—

Resettable soundness Zero-knowledge(black-box simulator) ๐’ซโˆ—

๐’ฑ ๐’ฎ๐’ฑโˆ—

[Barak-Goldreich-Goldwasser-Lindell 01]

Page 34: On the Impossibility of Approximate Obfuscation

Resettably-Sound ZK

๐’ฑ๐’ซโˆ— ๐’ฎ๐’ฑโˆ—

Resettable soundness Zero-knowledge (non-black-box simulator)๐’ซโˆ—

๐’ฑ

[Barak-Goldreich-Goldwasser-Lindell 01, BP 12, Chung-Pass-Seth 13]

Page 35: On the Impossibility of Approximate Obfuscation

๐’ซ ๐’ฑResettably-Sound ZK๐‘ ๐‘˜,๐‘ฃ๐‘˜๐‘ฃ๐‘˜

๐‘ฅโ†๐‘ˆ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Witness indistinguishable proof:

or โ€œknowsโ€

Page 36: On the Impossibility of Approximate Obfuscation

๐’ซ ๐’ฑResettably-Sound ZK๐‘ ๐‘˜,๐‘ฃ๐‘˜๐‘ฃ๐‘˜๐‘ฅ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Witness indistinguishable proof:

or โ€œknowsโ€

Page 37: On the Impossibility of Approximate Obfuscation

๐’ฑ๐’ซโˆ—๐‘ฅ๐‘“ ๐‘ ๐‘˜(๐‘ฅ )

Analysis

๐’ฎ ๐‘–๐‘š๐’ฑโˆ—

Resettable soundness Zero-knowledge

๐’ซโˆ—๐‘“ ๐‘ ๐‘˜

๐‘ ๐‘˜

๐’ฎ๐‘ ๐‘˜

๐ธ

Page 38: On the Impossibility of Approximate Obfuscation

โ€ข Resettably-sound ZK from OWFs (Different approach from Chung-Pass-Seth 13)

โ€ข Simultaneously-resettable ZK from OWFs (using srWI by Chung-Ostrovsky-Pass-Visconti 13)

โ€ข 4-message resettably-sound ZK โ€ข 3-message simultaneously-resettable

WI proof of knowledge

More Resettable Crypto

Page 39: On the Impossibility of Approximate Obfuscation

Sign ๐‘ ๐‘˜

Sign ๐‘ ๐‘˜

๐ด๐‘š ๐‘–

๐œŽ (๐‘šยฟยฟ ๐‘–)ยฟ๐‘ฃ๐‘˜

Digital Signatures:

Worst-Case Extractable Signatures

โˆ€๐‘ ๐‘˜ ,๐‘ฃ๐‘˜

Page 40: On the Impossibility of Approximate Obfuscation

Worst-Case Extractable SignaturesFor every

breaks security for โŸน

๐ด

๐ธ๐‘ ๐‘˜

Page 41: On the Impossibility of Approximate Obfuscation

Thank You.#define _ -F<00||--F-OO--;int F=00,OO=00;main(){F_OO();printf("%1.3f\n",4.*-F/OO/OO);}F_OO(){

_-_-_-_ _-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_ _-_-_-_

}

IOCCC 88


Recommended