How to Obfuscate Programs Directly

被引:74
作者
Zimmerman, Joe [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II | 2015年 / 9057卷
关键词
D O I
10.1007/978-3-662-46803-6_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new way to obfuscate programs, via composite-order multilinear maps. Our construction operates directly on straight-line programs (arithmetic circuits), rather than converting them to matrix branching programs as in other known approaches. This yields considerable efficiency improvements. For an NC 1 circuit of size s and depth d, with n inputs, we require only O(d(2)s(2) + n(2)) multilinear map operations to evaluate the obfuscated circuit-as compared with other known approaches, for which the number of operations is exponential in d. We prove virtual black-box (VBB) security for our construction in a generic model of multilinear maps of hidden composite order, extending previous models for the prime-order setting. Our scheme works either with "noisy" multilinear maps, which can only evaluate expressions of degree lambda(c) for pre-specified constant c; or with "clean" multilinear maps, which can evaluate arbitrary expressions. With "noisy" maps, our new obfuscator applies only to NC1 circuits, requiring the additional assumption of FHE in order to bootstrap to P/poly (as in other obfuscation constructions). From "clean" multilinear maps, on the other hand (whose existence is still open), we present the first approach that would achieve obfuscation for P/poly directly, without FHE. Our construction is efficient enough that if "clean" multilinear maps were known, then general-purpose program obfuscation could become implementable in practice. Our results demonstrate that the question of "clean" multilinear maps is not a technicality, but a central open problem.
引用
收藏
页码:439 / 467
页数:29
相关论文
共 42 条
[1]  
Ananth P., 2014, OPTIMIZING OBFUSCATI
[2]  
Ananth P., 2013, 2013689 CRYPT EPRINT
[3]  
[Anonymous], 2014, STOC
[4]  
[Anonymous], 2014, IACR CRYPTOLOGY EPRI
[5]  
Applebaum B., 2015, 2015025 CRYPT EPRINT
[6]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[7]  
Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
[8]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]  
Boneh D., 1996, PROC CRYPTO 96, V1109, P283, DOI [10.1007/3-540-68697-5_22, DOI 10.1007/3-540-68697-5_22]