on the impossibility of approximate obfuscation

41
On the Impossibility of Approximate Obfuscation Nir Bitansky and Omer Paneth

Upload: fisseha

Post on 25-Feb-2016

62 views

Category:

Documents


0 download

DESCRIPTION

On the Impossibility of Approximate Obfuscation. Nir Bitansky and Omer Paneth. Program Obfuscation. Compute . Program Obfuscation. Program Obfuscation. Sign email with If starts with “[email protected]”. Virtual Black-Box. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: On the Impossibility of Approximate Obfuscation

On the Impossibility of Approximate Obfuscation

Nir Bitansky and Omer Paneth

Page 2: On the Impossibility of Approximate Obfuscation

Program Obfuscation

Compute

𝑥

𝑦= 𝑓 𝑠𝑘(𝑥 )

Page 3: On the Impossibility of Approximate Obfuscation

Program Obfuscation𝑥

𝑦= 𝑓 𝑠𝑘(𝑥 )

Page 4: On the Impossibility of Approximate Obfuscation

Program Obfuscation

Sign email with If starts with

[email protected]

𝑥

𝑦=𝜎 (𝑥)/⊥

Page 5: On the Impossibility of Approximate Obfuscation

Virtual Black-Box

is an obfuscation of :

- Functionality:

𝑆𝑓 𝑠𝑘𝐴 ≈𝒪𝑠𝑘

- Security:

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Page 6: On the Impossibility of Approximate Obfuscation

Impossibility of Obfuscation

There exist families of functions that cannot be obfuscated

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Page 7: On the Impossibility of Approximate Obfuscation

Relaxed Security

- Functionality:

𝑆𝑓 𝑠𝑘𝐴 ≈𝒪𝑠𝑘

- Security:

[Barak et al. 01, Goldwasser-Rothblum07, Hofheinz-Malone-Lee-Stam07, Hohenberger-Rothblum-Shelat-Vaikuntanathan07,

Bitansky-Canetti10]

Page 8: On the Impossibility of Approximate Obfuscation

Relaxed Functionality?

- Functionality:

𝑆𝑓 𝑠𝑘𝐴 ≈𝒪𝑠𝑘

- Security:

Page 9: On the Impossibility of Approximate Obfuscation

Approximate Obfuscation[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

is an approximate obfuscation of :

- Functionality:

𝑆𝑓 𝑠𝑘𝐴 ≈𝒪𝑠𝑘

- Security:

Page 10: On the Impossibility of Approximate Obfuscation

Main ResultAssuming trapdoor permutations, there exist families of functions that cannot be approximately

obfuscatedMotivation?

Positive applications

Page 11: On the Impossibility of Approximate Obfuscation

From Impossibility to

Applications

Impossibility of approximate obfuscation

Non-black-box extraction

𝐴𝑠𝑘𝑥 𝑓 𝑠𝑘(𝑥 )

𝑠𝑘

Zero-knowledge with

resettable security

Worst-case extractable signatures

Page 12: On the Impossibility of Approximate Obfuscation

Plan[BGIRSVY 01]:

This work:

Impossibility of Obfuscation

Impossibility of Approximate Obfuscation

Unobfuscatable Functions

Robust Unobfuscatable

Functions

Applications

Page 13: On the Impossibility of Approximate Obfuscation

Unobfuscatable Functions

𝐴𝑓 𝑠𝑘

𝑠𝑘

𝐸𝒪 𝑠𝑘

1. Black-box unlearnability:

:2. Extraction: Pr𝑥←𝑈

[𝒪 (𝑥 )= 𝑓 𝑠𝑘 (𝑥 ) ]=1⇒

From Barak et al.

Page 14: On the Impossibility of Approximate Obfuscation

Robust Unobfuscatable Functions

1. Black-box unlearnability:

:2. Robust extraction:

𝐴𝑓 𝑠𝑘

𝑠𝑘

𝐸𝒪 𝑠𝑘Pr𝑥←𝑈

[𝒪 (𝑥 )= 𝑓 𝑠𝑘 (𝑥 ) ]>0 .9⇒

Page 15: On the Impossibility of Approximate Obfuscation

Robust Unobfuscatable Functions

𝑓 𝑠𝑘𝒪𝑆𝑓 𝑠𝑘𝐴 ≈𝒪

𝑠𝑘𝑠𝑘

𝐸

Page 16: On the Impossibility of Approximate Obfuscation

RUFs Construction

Page 17: On the Impossibility of Approximate Obfuscation

Unobfuscatable FunctionsConstruction of Barak et al. (using FHE for simplicity)

– two -bit strings - secret key for FHE

𝑓 𝑎 ,𝑏 , 𝑠𝑘 (𝑥 ) :

Page 18: On the Impossibility of Approximate Obfuscation

𝑓 𝑎 ,𝑏 , 𝑠𝑘(𝑥 )¿ {¿¿𝑥=𝑎𝑥=0𝑛De c𝑠𝑘(𝑥)=𝑏o . w .

En c𝑠𝑘(𝑎)𝑏

𝑏

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

𝑓

𝑓

𝑓

Unobfuscatable Functions

Page 19: On the Impossibility of Approximate Obfuscation

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

𝑓

𝑓

𝑓

Black-Box Unlearnability

𝐴𝑓𝑏

Page 20: On the Impossibility of Approximate Obfuscation

𝐶

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

Extraction

𝐸𝐶≡ 𝑓 𝑏

𝐸𝑣𝑎𝑙 (𝐶 )𝐶𝐶

𝐶

Page 21: On the Impossibility of Approximate Obfuscation

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

Robust Extraction?

𝐸

𝐶∗𝐶∗

𝐶∗ 𝑏 𝐶∗(𝑥)={ ⊥𝐸𝑛𝑐𝑠𝑘(𝑎)

𝑥=𝑎𝑥=0𝑛

𝑏⊥

𝐷𝑒𝑐𝑠 𝑘(𝑥 )=𝑏𝑜 .𝑤 .

Page 22: On the Impossibility of Approximate Obfuscation

A Taste of the Construction

𝑓 𝑎 ,𝑏(𝑥)={𝑏 𝑥=𝑎⊥ 𝑜 .𝑤 .

Q: Find such that:

with errors 𝑓 a , b

Randomly reduce to

Page 23: On the Impossibility of Approximate Obfuscation

Getting Robustness

𝑓 𝑎 ,𝑏(𝑥)={𝑏 𝑥=𝑎⊥ 𝑜 .𝑤 .

Page 24: On the Impossibility of Approximate Obfuscation

with errors 𝑓 a , b

𝑔h

𝑎𝑟

𝑎⊕𝑟 ⊕

𝑟←𝑈𝑏⊕PRF (𝑟 )

PRF (𝑟 )

𝑓

Page 25: On the Impossibility of Approximate Obfuscation

𝑔 , h 𝑓 a , b

𝐴𝑔 , h

𝑏

𝑎 𝑎 queries on and queries on

Page 26: On the Impossibility of Approximate Obfuscation

Construction of RUFs

¿ { 𝑏𝐸𝑛𝑐𝑠 𝑘(𝑎)

𝑥=𝑎𝑥=0𝑛

𝑏⊥

𝐷𝑒𝑐𝑠𝑘(𝑥)=𝑏𝑜 .𝑤 .

𝑓 𝑎 ,𝑏 , 𝑠𝑘(𝑥 )

Page 27: On the Impossibility of Approximate Obfuscation

• RUFs from trapdoor permutations.

• Weak RUFs from OWF only:

Assumptions

𝐸𝒪 𝑠𝑘

∀ 𝑥 :𝒪 (𝑥 )∈ { 𝑓 𝑠𝑘 (𝑥 ) ,⊥}

Page 28: On the Impossibility of Approximate Obfuscation

Applications

Page 29: On the Impossibility of Approximate Obfuscation

Publicly-Verifiable RUOFs

𝐴𝑓 𝑠𝑘

𝑠𝑘 𝐸𝒪 𝑠𝑘

iff

𝑣𝑘 𝑣𝑘

𝑠𝑘,𝑣𝑘←Gen () Pr𝑥←𝑈

[Ver𝑣𝑘 (𝑥 ,𝒪 (𝑥 ) )=1 ]> 1poly(𝑛)

Page 30: On the Impossibility of Approximate Obfuscation

Resettably-Sound ZK[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

𝑥∈ℒ?𝒫Standard ZK

ResettableSoundnes

s𝒱

Page 31: On the Impossibility of Approximate Obfuscation

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

𝒱𝒫∗𝑥∉ℒ

Page 32: On the Impossibility of Approximate Obfuscation

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

𝒱𝒫∗𝑥∉ℒ𝒱

Page 33: On the Impossibility of Approximate Obfuscation

No Black-Box Simulator

𝒱𝒫∗

Resettable soundness Zero-knowledge(black-box simulator) 𝒫∗

𝒱 𝒮𝒱∗

[Barak-Goldreich-Goldwasser-Lindell 01]

Page 34: On the Impossibility of Approximate Obfuscation

Resettably-Sound ZK

𝒱𝒫∗ 𝒮𝒱∗

Resettable soundness Zero-knowledge (non-black-box simulator)𝒫∗

𝒱

[Barak-Goldreich-Goldwasser-Lindell 01, BP 12, Chung-Pass-Seth 13]

Page 35: On the Impossibility of Approximate Obfuscation

𝒫 𝒱Resettably-Sound ZK𝑠𝑘,𝑣𝑘𝑣𝑘

𝑥←𝑈𝑓 𝑠𝑘(𝑥 )

Witness indistinguishable proof:

or “knows”

Page 36: On the Impossibility of Approximate Obfuscation

𝒫 𝒱Resettably-Sound ZK𝑠𝑘,𝑣𝑘𝑣𝑘𝑥𝑓 𝑠𝑘(𝑥 )

Witness indistinguishable proof:

or “knows”

Page 37: On the Impossibility of Approximate Obfuscation

𝒱𝒫∗𝑥𝑓 𝑠𝑘(𝑥 )

Analysis

𝒮 𝑖𝑚𝒱∗

Resettable soundness Zero-knowledge

𝒫∗𝑓 𝑠𝑘

𝑠𝑘

𝒮𝑠𝑘

𝐸

Page 38: On the Impossibility of Approximate Obfuscation

• Resettably-sound ZK from OWFs (Different approach from Chung-Pass-Seth 13)

• Simultaneously-resettable ZK from OWFs (using srWI by Chung-Ostrovsky-Pass-Visconti 13)

• 4-message resettably-sound ZK • 3-message simultaneously-resettable

WI proof of knowledge

More Resettable Crypto

Page 39: On the Impossibility of Approximate Obfuscation

Sign 𝑠𝑘

Sign 𝑠𝑘

𝐴𝑚 𝑖

𝜎 (𝑚¿¿ 𝑖)¿𝑣𝑘

Digital Signatures:

Worst-Case Extractable Signatures

∀𝑠𝑘 ,𝑣𝑘

Page 40: On the Impossibility of Approximate Obfuscation

Worst-Case Extractable SignaturesFor every

breaks security for ⟹

𝐴

𝐸𝑠𝑘

Page 41: On the Impossibility of Approximate Obfuscation

Thank You.#define _ -F<00||--F-OO--;int F=00,OO=00;main(){F_OO();printf("%1.3f\n",4.*-F/OO/OO);}F_OO(){

_-_-_-_ _-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_ _-_-_-_

}

IOCCC 88