Obfuscating Circuits Via Composite-Order Graded Encoding

Benny Applebaum*, Zvika Brakerski

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

We present a candidate obfuscator based on composite-order graded encoding schemes (GES), which are a generalization of multilinear maps. Our obfuscator operates on circuits directly without converting them into formulas or branching programs as was done in previous solutions. As a result, the time and size complexity of the obfuscated program, measured by the number of GES elements, is directly proportional to the circuit complexity of the program being obfuscated. This improves upon previous constructions whose complexity was related to the formula or branching program size. Known instantiations of Graded Encoding Schemes allow us to obfuscate circuit classes of polynomial degree, which include for example families of circuits of logarithmic depth. We prove that our obfuscator is secure against a class of generic algebraic attacks, formulated by a generic graded encoding model. We further consider a more robust model which provides more power to the adversary and extend our results to this setting as well. As a secondary contribution, we define a new simple notion of algebraic security (which was implicit in previous works) and show that it captures standard security relative to an ideal GES oracle.

Original languageEnglish
Article number14
JournalJournal of Cryptology
Volume34
Issue number2
DOIs
StatePublished - Apr 2021

Funding

FundersFunder number
Alon Young Faculty Fellowship
Check Point Institute for Information Security
ERC-StG-2014-2020639813 ERC-CLC
European Unions Horizon 2020 Programme
Horizon 2020 Framework Programme639813
German-Israeli Foundation for Scientific Research and Development1152/2011
Israel Science Foundation468/14, 1155/11
Ministry of Science and Technology, Israel3-9094

    Fingerprint

    Dive into the research topics of 'Obfuscating Circuits Via Composite-Order Graded Encoding'. Together they form a unique fingerprint.

    Cite this