Indistinguishability Obfuscation with Non-trivial Efficiency

It is well known that inefficient indistinguishability obfuscators $$\mathbf{iO } $$ with running time $${{\mathrm{poly}}}|C|,\lambda \cdot 2^n$$ , where C is the circuit to be obfuscated, $$\lambda $$ is the security parameter, and n is the input length of C, exists unconditionally: simply output the function table of C i.e., the output of C on all possible inputs. Such inefficient obfuscators, however, are not useful for applications. We here consider $$\mathbf{iO } $$ with a slightly "non-trivial" notion of efficiency: the running-time of the obfuscator may still be "trivial" namely, $${{\mathrm{poly}}}|C|,\lambda \cdot 2^{n}$$ , but we now require that the obfuscated code is just slightly smaller than the truth table of C namely $${{\mathrm{poly}}}|C|,\lambda \cdot 2^{n1-\epsilon }$$ , where $$\epsilon >0$$ ; we refer to this notion as iOwith exponential efficiency, or simply exponentially-efficientiOXio. We show that, perhaps surprisingly, under the subexponential LWE assumption, subexponentially-secure XiO for polynomial-size circuits implies polynomial-time computable iO for all polynomial-size circuits.

[1]  Ran Canetti,et al.  Indistinguishability Obfuscation of Iterated Circuits and RAM Programs , 2014, IACR Cryptol. ePrint Arch..

[2]  Brent Waters,et al.  Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[3]  Jean-Sébastien Coron,et al.  Practical Multilinear Maps over the Integers , 2013, CRYPTO.

[4]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[5]  Brent Waters,et al.  How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..

[6]  Abhi Shelat,et al.  Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings , 2016, TCC.

[7]  Allison Bishop,et al.  Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.

[8]  Brent Waters,et al.  Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.

[9]  Allison Bishop,et al.  Witness Encryption from Instance Independent Assumptions , 2014, IACR Cryptol. ePrint Arch..

[10]  Vinod Vaikuntanathan,et al.  The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically , 2014, IACR Cryptol. ePrint Arch..

[11]  Allison Bishop,et al.  Indistinguishability Obfuscation for Turing Machines with Unbounded Memory , 2015, IACR Cryptol. ePrint Arch..

[12]  Ran Canetti,et al.  Obfuscation of Probabilistic Circuits and Applications , 2015, TCC.

[13]  Rafael Pass,et al.  Output-Compressing Randomized Encodings and Applications , 2016, TCC.

[14]  ApplebaumBenny,et al.  Cryptography in $NC^0$ , 2006 .

[15]  Nir Bitansky,et al.  Succinct Randomized Encodings and their Applications , 2015, IACR Cryptol. ePrint Arch..

[16]  Craig Gentry,et al.  Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.

[17]  Jung Hee Cheon,et al.  Cryptanalysis of the Multilinear Map over the Integers , 2014, EUROCRYPT.

[18]  Craig Gentry,et al.  Two-Round Secure MPC from Indistinguishability Obfuscation , 2014, TCC.

[19]  Yuval Ishai,et al.  Cryptography in NC0 , 2004, SIAM J. Comput..

[20]  B. Applebaum Cryptography in NC0 , 2014 .

[21]  Kai-Min Chung,et al.  On Extractability Obfuscation , 2014, IACR Cryptol. ePrint Arch..

[22]  Aggelos Kiayias,et al.  Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..

[23]  Craig Gentry,et al.  Graph-Induced Multilinear Maps from Lattices , 2015, TCC.

[24]  Mohammad Mahmoody,et al.  More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models , 2015, IACR Cryptol. ePrint Arch..

[25]  Brice Minaud,et al.  Cryptanalysis of the New Multilinear Map over the Integers , 2015, IACR Cryptol. ePrint Arch..

[26]  Adam O'Neill,et al.  Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..

[27]  Brice Minaud,et al.  Cryptanalysis of the New CLT Multilinear Map over the Integers , 2016, EUROCRYPT.

[28]  Craig Gentry,et al.  Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.

[29]  Yael Tauman Kalai,et al.  Protecting Obfuscation against Algebraic Attacks , 2014, EUROCRYPT.

[30]  Yael Tauman Kalai,et al.  On Obfuscation with Random Oracles , 2015, TCC.

[31]  Jean-Sébastien Coron,et al.  New Multilinear Maps Over the Integers , 2015, CRYPTO.

[32]  Mohammad Mahmoody,et al.  On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models , 2016, TCC.

[33]  Yael Tauman Kalai,et al.  On the impossibility of obfuscation with auxiliary input , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[34]  Brent Waters,et al.  Functional encryption: a new vision for public-key cryptography , 2012, CACM.

[35]  Yael Tauman Kalai,et al.  Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.

[36]  Rafael Pass,et al.  Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings , 2014, CRYPTO.

[37]  Yuval Ishai,et al.  Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.

[38]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[39]  Yuval Ishai,et al.  Cryptography in NC0 , 2004, FOCS.

[40]  Moni Naor,et al.  On Cryptographic Assumptions and Challenges , 2003, CRYPTO.

[41]  Abhishek Jain,et al.  Indistinguishability Obfuscation from Compact Functional Encryption , 2015, CRYPTO.

[42]  Mark Zhandry,et al.  Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation , 2014, Algorithmica.

[43]  Shafi Goldwasser,et al.  Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.

[44]  Nir Bitansky,et al.  Indistinguishability Obfuscation from Functional Encryption , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.