ONE-WAY FUNCTIONS AND (IM)PERFECT OBFUSCATION

Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

A program obfuscator takes a program and outputs a ``scrambled"" version of it, where the goal is that the obfuscated program will not reveal much about its structure beyond what is apparent from executing it. There are several ways of formalizing this goal. Specifically, in indistinguishability obfuscation, first defined by Barak et al. [Advances in Cryptology - CRYPTO, 2001, Lect. Notes Comput. Sci. 2139, Springer, Berlin, Heidelberg, pp. 1-18], the requirement is that the results of obfuscating any two functionally equivalent programs (circuits) will be computationally indistinguishable. In 2013, a fascinating candidate construction for indistinguishability obfuscation was proposed by Garg et al. [Proceedings of the Symposium on Theory of Computing Conference, STOC, ACM, 2013, pp. 467-476]. This has led to a flurry of discovery of intriguing constructions of primitives and protocols whose existence was not previously known (for instance, fully deniable encryption by Sahai and Waters [Proceedings of the Symposium on Theory of Computing, 2014, STOC, pp. 475-484]). Most of them explicitly rely on additional hardness assumptions, such as one-way functions. Our goal is to get rid of this extra assumption.

Original languageEnglish
Pages (from-to)1769-1795
Number of pages27
JournalSIAM Journal on Computing
Volume51
Issue number6
DOIs
StatePublished - 2022

Bibliographical note

Publisher Copyright:
© by SIAM. Unauthorized reproduction of this article is prohibited.

Funding

ILAN KOMARGODSKI\dagger , TAL MORAN\ddagger , MONI NAOR\S , RAFAEL PASS\P , ALON ROSEN\| , AND EYLON YOGEV\# Abstract. A program obfuscator takes a program and outputs a ``scrambled"" version of it, where the goal is that the obfuscated program will not reveal much about its structure beyond what is apparent from executing it. There are several ways of formalizing this goal. Specifically, in indistinguishability obfuscation, first defined by Barak et al. [Advances in Cryptology - CRYPTO, 2001, Lect. Notes Comput. Sci. 2139, Springer, Berlin, Heidelberg, pp. 1--18], the requirement is that the results of obfuscating any two functionally equivalent programs (circuits) will be computationally indistinguishable. In 2013, a fascinating candidate construction for indistinguishability obfuscation was proposed by Garg et al. [Proceedings of the Symposium on Theory of Computing Conference, STOC, ACM, 2013, pp. 467--476]. This has led to a flurry of discovery of intriguing constructions of primitives and protocols whose existence was not previously known (for instance, fully deniable encryption by Sahai and Waters [Proceedings of the Symposium on Theory of Computing, 2014, STOC, pp. 475--484]). Most of them explicitly rely on additional hardness assumptions, such as one-way functions. Our goal is to get rid of this extra assumption. We cannot argue that indistinguishability obfuscation of all polynomial-time circuits implies the existence of one-way functions, since if \sansP = \sansN \sansP , then \ast Received by the editors November 16, 2015; accepted for publication (in revised form) August 2, 2022; published electronically December 20, 2022. A preliminary version of this work appeared in Proceedings of the 55th Annual Symposium on Foundations of Computer Science (FOCS 2014). This paper incorporates the manuscript of There is no indistinguishability obfuscation in Pessiland, IACR Cryptol. ePrint Arch., 2013 (2013), 643. https://doi.org/10.1137/15M1048549 Funding: The first author is the incumbent of the Harry \& Abe Sherman Senior Lectureship at the School of Computer Science and Engineering at the Hebrew University, supported in part by an Alon Young Faculty Fellowship, by a grant from the Israel Science Foundation (ISF grant 1774/20), and by a grant from the U.S.-Israel Binational Science Foundation and the U.S. National Science Foundation (BSF-NSF grant 2020643). Most of this work was done while the first author was at the Weizmann Institute. The second author is supported by ISF grant 1790/13 and by the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement 293843. The third author is supported in part by a grant from the I-CORE Program of the Planning and Budgeting Committee, the Israel Science Foundation, BSF, IMOS, and the Citi Foundation. The third author is the incumbent of the Judith Kleeman Professorial Chair. The fourth author is supported in part by an Alfred P. Sloan Fellowship, Microsoft New Faculty Fellowship, NSF Award CNS-1217821, NSF CAREER Award CCF-0746990, NSF Award CCF-1214844, AFOSR YIP Award FA9550-10-1-0093, and DARPA and AFRL under contract FA8750-11-2-0211. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the U.S. Government. The fifth author was originally supported by ISF grant 1255/12 and by the ERC under the EU's Seventh Framework Programme (FP/2007-2013) ERC grant agreement 307952. Currently, the fifth author is supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement 101019547), by ISF grant 1399/17, and by project PROMETHEUS (grant 780701). The sixth author is supported by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office, and by the Alter Family Foundation. Most of this work was done while the sixth author was at the Weizmann Institute.

FundersFunder number
IMOS
School of Computer Science and Engineering at the Hebrew University
National Science FoundationCCF-1214844, 1790/13, CCF-0746990, CNS-1217821, 2020643
Air Force Office of Scientific ResearchFA9550-10-1-0093
Defense Advanced Research Projects Agency1255/12
Citi Foundation
Air Force Research LaboratoryFA8750-11-2-0211
Boler Family Foundation
Seventh Framework Programme293843
European Commission
United States-Israel Binational Science Foundation
Israel Science Foundation1774/20
Seventh Framework ProgrammeFP/2007-2013, 307952
Israeli Centers for Research Excellence
Horizon 20201399/17, 101019547, 780701

    Fingerprint

    Dive into the research topics of 'ONE-WAY FUNCTIONS AND (IM)PERFECT OBFUSCATION'. Together they form a unique fingerprint.

    Cite this