Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1060590.1060669acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

On obfuscating point functions

Published: 22 May 2005 Publication History

Abstract

We investigate the possibility of obfuscating point functions in the framework of Barak et al. from Crypto '01. A point function is a Boolean function that assumes the value 1 at exactly one point. Our main results are as follows:We provide a simple construction of efficient obfuscators for point functions for a slightly relaxed notion of obfuscation, for which obfuscating general circuits is nonetheless impossible. Our construction relies on the existence of a very strong one-way permutation, and yields the first non-trivial obfuscator under general assumptions in the standard model. We also obtain obfuscators for point functions with multi-bit output and for prefix matching.Our assumption is that there is a one-way permutation wherein any polynomial-sized circuit inverts the permutation on at most a polynomial number of inputs. We show that a similar assumption is in fact necessary, and that our assumption holds relative to a random permutation oracle.Finally, we establish two impossibility results which indicate that the limitations on our construction, namely simulating only adversaries with single-bit output and using nonuniform advice in our simulator, are in some sense inherent.Previous work gave negative results for the general class of circuits (Barak et al., Crypto '01) and positive results in the random oracle model (Lynn et al., Eurocrypt '04) or under non-standard number-theoretic assumptions (Canetti, Crypto '97). This work represents the first effort to bridge the gap between the two for a natural class of functionalities.

References

[1]
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Proc. Crypto '01, 2001.]]
[2]
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal of Computing, 13(4):850--864, 1984.]]
[3]
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Proc. Crypto '97, 1997.]]
[4]
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proc. 30th STOC, 1998.]]
[5]
R. Canetti, D. Micciancio, and O. Reingold. Perfectly one-way probabilistic hash functions. In Proc. 30th STOC, 1998.]]
[6]
Y. Dodis and A. Smith. Correcting errors without leaking partial information. In these proceedings, 2005.]]
[7]
C. Dwork, M. Naor, and A. Sahai. Concurrent zero-knowledge. In Proc. 30th STOC, 1998.]]
[8]
R. Gennaro and L. Trevisan. Lower bounds on efficiency of generic cryptographic constructions. In Proc. 41st FOCS, 2000.]]
[9]
O. Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2001.]]
[10]
O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM Journal on Computing, 25(1):169--192, 1996.]]
[11]
O. Goldreich and L. Levin. Hard-core predicates for any one-way function. In Proc. 21st STOC, 1989.]]
[12]
N. Linial, Y. Mansour, and N. Nissan. Constant depth circuits, fourier transform, and learnability. Journal of the ACM, 40(3):607--620, 1993.]]
[13]
A. Lubotzky, R. Philips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8(3):261--277, 1988.]]
[14]
M. Luby. Pseudorandomness and Cryptographic Applications. Princeton University Press, 1996.]]
[15]
B. Lynn, M. Prabhakaran, and A. Sahai. Positive results and techniques for obfuscation. In Proc. Eurocrypt '04, 2004.]]
[16]
J. B. Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In Proc. Crypto '02, 2002.]]
[17]
D. Wagner and I. Goldberg. Proofs of security for the unix password hashing algorithm. In Proc. Asiacrypt '00, 2000.]]
[18]
A. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, 1982.]]

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
May 2005
778 pages
ISBN:1581139608
DOI:10.1145/1060590
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 May 2005

Permissions

Request permissions for this article.

Check for updates

Author Tag

  1. obfuscation

Qualifiers

  • Article

Conference

STOC05
Sponsor:
STOC05: Symposium on Theory of Computing
May 22 - 24, 2005
MD, Baltimore, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)4
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Obfuscation of evasive algebraic set membershipAdvances in Mathematics of Communications10.3934/amc.2024014(0-0)Online publication date: 2024
  • (2024)OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoTInformation Security Practice and Experience10.1007/978-981-97-9053-1_22(383-402)Online publication date: 25-Oct-2024
  • (2024)Quantum Point ObfuscationQuantum Nonlinear Function Obfuscation Theory and Application10.1007/978-981-97-6722-9_3(31-49)Online publication date: 16-Oct-2024
  • (2024)IntroductionQuantum Nonlinear Function Obfuscation Theory and Application10.1007/978-981-97-6722-9_1(1-14)Online publication date: 16-Oct-2024
  • (2024)Obfuscating Evasive Decision TreesProgress in Cryptology – INDOCRYPT 202310.1007/978-3-031-56235-8_5(84-104)Online publication date: 29-Mar-2024
  • (2023)On some problems of using individual postulates of the "economic theory of crimes and punishments" for the purposes of "optimizing the level of crimeAdvances in Law Studies10.29039/2409-5087-2023-11-3-46-5011:3(46-50)Online publication date: 24-Oct-2023
  • (2023)Code-Based Conjunction ObfuscationChinese Journal of Electronics10.23919/cje.2020.00.37732:2(237-247)Online publication date: Mar-2023
  • (2023)Revisiting Time-Space Tradeoffs for Function InversionAdvances in Cryptology – CRYPTO 202310.1007/978-3-031-38545-2_15(453-481)Online publication date: 9-Aug-2023
  • (2023)Structure-Preserving Compilers from New Notions of ObfuscationsPublic-Key Cryptography – PKC 202310.1007/978-3-031-31371-4_23(663-693)Online publication date: 2-May-2023
  • (2023)How to Obfuscate MPC InputsTheory of Cryptography10.1007/978-3-031-22365-5_6(151-180)Online publication date: 1-Jan-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media