Abstract
A program obfuscator takes a program and outputs a ``scrambled"" version of it, where the goal is that the obfuscated program will not reveal much about its structure beyond what is apparent from executing it. There are several ways of formalizing this goal. Specifically, in indistinguishability obfuscation, first defined by Barak et al. [Advances in Cryptology - CRYPTO, 2001, Lect. Notes Comput. Sci. 2139, Springer, Berlin, Heidelberg, pp. 1-18], the requirement is that the results of obfuscating any two functionally equivalent programs (circuits) will be computationally indistinguishable. In 2013, a fascinating candidate construction for indistinguishability obfuscation was proposed by Garg et al. [Proceedings of the Symposium on Theory of Computing Conference, STOC, ACM, 2013, pp. 467-476]. This has led to a flurry of discovery of intriguing constructions of primitives and protocols whose existence was not previously known (for instance, fully deniable encryption by Sahai and Waters [Proceedings of the Symposium on Theory of Computing, 2014, STOC, pp. 475-484]). Most of them explicitly rely on additional hardness assumptions, such as one-way functions. Our goal is to get rid of this extra assumption.
Original language | English |
---|---|
Pages (from-to) | 1769-1795 |
Number of pages | 27 |
Journal | SIAM Journal on Computing |
Volume | 51 |
Issue number | 6 |
DOIs | |
State | Published - 2022 |
Bibliographical note
Publisher Copyright:© by SIAM. Unauthorized reproduction of this article is prohibited.
Funding
ILAN KOMARGODSKI\dagger , TAL MORAN\ddagger , MONI NAOR\S , RAFAEL PASS\P , ALON ROSEN\| , AND EYLON YOGEV\# Abstract. A program obfuscator takes a program and outputs a ``scrambled"" version of it, where the goal is that the obfuscated program will not reveal much about its structure beyond what is apparent from executing it. There are several ways of formalizing this goal. Specifically, in indistinguishability obfuscation, first defined by Barak et al. [Advances in Cryptology - CRYPTO, 2001, Lect. Notes Comput. Sci. 2139, Springer, Berlin, Heidelberg, pp. 1--18], the requirement is that the results of obfuscating any two functionally equivalent programs (circuits) will be computationally indistinguishable. In 2013, a fascinating candidate construction for indistinguishability obfuscation was proposed by Garg et al. [Proceedings of the Symposium on Theory of Computing Conference, STOC, ACM, 2013, pp. 467--476]. This has led to a flurry of discovery of intriguing constructions of primitives and protocols whose existence was not previously known (for instance, fully deniable encryption by Sahai and Waters [Proceedings of the Symposium on Theory of Computing, 2014, STOC, pp. 475--484]). Most of them explicitly rely on additional hardness assumptions, such as one-way functions. Our goal is to get rid of this extra assumption. We cannot argue that indistinguishability obfuscation of all polynomial-time circuits implies the existence of one-way functions, since if \sansP = \sansN \sansP , then \ast Received by the editors November 16, 2015; accepted for publication (in revised form) August 2, 2022; published electronically December 20, 2022. A preliminary version of this work appeared in Proceedings of the 55th Annual Symposium on Foundations of Computer Science (FOCS 2014). This paper incorporates the manuscript of There is no indistinguishability obfuscation in Pessiland, IACR Cryptol. ePrint Arch., 2013 (2013), 643. https://doi.org/10.1137/15M1048549 Funding: The first author is the incumbent of the Harry \& Abe Sherman Senior Lectureship at the School of Computer Science and Engineering at the Hebrew University, supported in part by an Alon Young Faculty Fellowship, by a grant from the Israel Science Foundation (ISF grant 1774/20), and by a grant from the U.S.-Israel Binational Science Foundation and the U.S. National Science Foundation (BSF-NSF grant 2020643). Most of this work was done while the first author was at the Weizmann Institute. The second author is supported by ISF grant 1790/13 and by the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement 293843. The third author is supported in part by a grant from the I-CORE Program of the Planning and Budgeting Committee, the Israel Science Foundation, BSF, IMOS, and the Citi Foundation. The third author is the incumbent of the Judith Kleeman Professorial Chair. The fourth author is supported in part by an Alfred P. Sloan Fellowship, Microsoft New Faculty Fellowship, NSF Award CNS-1217821, NSF CAREER Award CCF-0746990, NSF Award CCF-1214844, AFOSR YIP Award FA9550-10-1-0093, and DARPA and AFRL under contract FA8750-11-2-0211. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the U.S. Government. The fifth author was originally supported by ISF grant 1255/12 and by the ERC under the EU's Seventh Framework Programme (FP/2007-2013) ERC grant agreement 307952. Currently, the fifth author is supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement 101019547), by ISF grant 1399/17, and by project PROMETHEUS (grant 780701). The sixth author is supported by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office, and by the Alter Family Foundation. Most of this work was done while the sixth author was at the Weizmann Institute.
Funders | Funder number |
---|---|
IMOS | |
School of Computer Science and Engineering at the Hebrew University | |
National Science Foundation | CCF-1214844, 1790/13, CCF-0746990, CNS-1217821, 2020643 |
Air Force Office of Scientific Research | FA9550-10-1-0093 |
Defense Advanced Research Projects Agency | 1255/12 |
Citi Foundation | |
Air Force Research Laboratory | FA8750-11-2-0211 |
Boler Family Foundation | |
Seventh Framework Programme | 293843 |
European Commission | |
United States-Israel Binational Science Foundation | |
Israel Science Foundation | 1774/20 |
Seventh Framework Programme | FP/2007-2013, 307952 |
Israeli Centers for Research Excellence | |
Horizon 2020 | 1399/17, 101019547, 780701 |