On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models

被引:8
作者
Mahmoody, Mohammad [1 ]
Mohammed, Ameer [1 ]
Nematihaji, Soheil [1 ]
机构
[1] Univ Virginia, Charlottesville, VA USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I | 2016年 / 9562卷
基金
美国国家科学基金会;
关键词
Virtual black-box obfuscation; Idealized models; Graded encoding; Generic group model;
D O I
10.1007/978-3-662-49096-9_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The celebrated work of Barak et al. (Crypto'01) ruled out the possibility of virtual black-box (VBB) obfuscation for general circuits. The recent work of Canetti, Kalai, and Paneth (TCC'15) extended this impossibility to the random oracle model as well assuming the existence of trapdoor permutations (TDPs). On the other hand, the works of Barak et al. (Crypto'14) and Brakerski-Rothblum (TCC'14) showed that general VBB obfuscation is indeed possible in idealized graded encoding models. The recent work of Pass and Shelat (Cryptology ePrint 2015/383) complemented this result by ruling out general VBB obfuscation in idealized graded encoding models that enable evaluation of constant-degree polynomials in finite fields. In this work, we extend the above two impossibility results for general VBB obfuscation in idealized models. In particular we prove the following two results both assuming the existence of trapdoor permutations: - There is no general VBB obfuscation in the generic group model of Shoup (Eurocrypt'97) for any abelian group. By applying our techniques to the setting of Pass and Shelat we extend their result to any (even non-commutative) finite ring. - There is no general VBB obfuscation in the random trapdoor permutation oracle model. Note that as opposed to the random oracle which is an idealized primitive for symmetric primitives, random trapdoor permutation is an idealized public-key primitive.
引用
收藏
页码:18 / 48
页数:31
相关论文
共 20 条
[1]  
[Anonymous], 2015048 CRYPT EPRINT
[2]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[3]  
Barak B., 2013, 2013631 IACR CRYPT E, V2013, P631
[4]  
Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
[5]  
Bitansky N, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P241
[6]  
Brakerski Z, 2014, LECT NOTES COMPUT SC, V8349, P1, DOI 10.1007/978-3-642-54242-8_1
[7]   The random oracle methodology, revisited [J].
Canetti, R ;
Goldreich, O ;
Halevi, S .
JOURNAL OF THE ACM, 2004, 51 (04) :557-594
[8]  
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[9]   Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits (Extended Abstract) [J].
Garg, Sanjam ;
Gentry, Craig ;
Halevi, Shai ;
Raykova, Mariana ;
Sahai, Amit ;
Waters, Brent .
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2013, :40-49
[10]  
Garg S, 2013, LECT NOTES COMPUT SC, V7881, P1, DOI 10.1007/978-3-642-38348-9_1