Obfuscating simple functionalities from knowledge assumptions

This paper shows how to obfuscate several simple functionalities from a new Knowledge of OrthogonALity Assumption (KOALA) in cyclic groups which is shown to hold in the Generic Group Model. Specifically, we give simpler and stronger security proofs for obfuscation schemes for point functions, general-output point functions and pattern matching with wildcards. We also revisit the work of Bishop et al. (CRYPTO 2018) on obfuscating the pattern matching with wildcards functionality. We improve upon the construction and the analysis in several ways: attacks and stronger guarantees: We show that the construction achieves virtual black-box security for a simulator that runs in time roughly \(2^{n/2}\), as well as distributional security for larger classes of distributions. We give attacks that show that our results are tight. weaker assumptions: We prove security under KOALA. better efficiency: We also provide a construction that outputs \(n+1\) instead of 2n group elements.

[1]  Nir Bitansky,et al.  On Strong Simulation and Composable Point Obfuscation , 2010, CRYPTO.

[2]  Mark Zhandry,et al.  New Techniques for Obfuscating Conjunctions , 2019, IACR Cryptol. ePrint Arch..

[3]  Allison Bishop,et al.  A Simple Obfuscation Scheme for Pattern-Matching with Wildcards , 2018, IACR Cryptol. ePrint Arch..

[4]  Amit Sahai,et al.  Positive Results and Techniques for Obfuscation , 2004, EUROCRYPT.

[5]  Vinod Vaikuntanathan,et al.  Obfuscating Conjunctions under Entropic Ring LWE , 2016, ITCS.

[6]  Ivan Damgård,et al.  Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.

[7]  Ran Canetti,et al.  Obfuscating Point Functions with Multibit Output , 2008, EUROCRYPT.

[8]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[9]  Ran Canetti,et al.  Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.

[10]  Ran Canetti,et al.  Obfuscation of Hyperplane Membership , 2010, TCC.

[11]  Eike Kiltz,et al.  The Algebraic Group Model and its Applications , 2018, IACR Cryptol. ePrint Arch..

[12]  Satoshi Hada,et al.  Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.

[13]  Daniel Wichs,et al.  Obfuscating Compute-and-Compare Programs under LWE , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).

[14]  Hoeteck Wee,et al.  On obfuscating point functions , 2005, STOC '05.

[15]  Guy N. Rothblum,et al.  Obfuscating Conjunctions , 2015, Journal of Cryptology.

[16]  Brent Waters,et al.  Lockable Obfuscation , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).