TY - GEN
T1 - Obfuscation for evasive functions
AU - Barak, Boaz
AU - Bitansky, Nir
AU - Canetti, Ran
AU - Kalai, Yael Tauman
AU - Paneth, Omer
AU - Sahai, Amit
PY - 2014
Y1 - 2014
N2 - An evasive circuit family is a collection of circuits such that for every input x, a random circuit from outputs 0 on x with overwhelming probability. We provide a combination of definitional, constructive, and impossibility results regarding obfuscation for evasive functions: 1 The (average case variants of the) notions of virtual black box obfuscation (Barak et al, CRYPTO '01) and virtual gray box obfuscation (Bitansky and Canetti, CRYPTO '10) coincide for evasive function families. We also define the notion of input-hiding obfuscation for evasive function families, stipulating that for a random it is hard to find, given, a value outside the preimage of 0. Interestingly, this natural definition, also motivated by applications, is likely not implied by the seemingly stronger notion of average-case virtual black-box obfuscation. 2 If there exist average-case virtual gray box obfuscators for all evasive function families, then there exist (quantitatively weaker) average-case virtual gray obfuscators for all function families. 3 There does not exist a worst-case virtual black box obfuscator even for evasive circuits, nor is there an average-case virtual gray box obfuscator for evasive Turing machine families. 4 Let be an evasive circuit family consisting of functions that test if a low-degree polynomial (represented by an efficient arithmetic circuit) evaluates to zero modulo some large prime p. Then under a natural analog of the discrete logarithm assumption in a group supporting multilinear maps, there exists an input-hiding obfuscator for. Under a new perfectly-hiding multilinear encoding assumption, there is an average-case virtual black box obfuscator for the family.
AB - An evasive circuit family is a collection of circuits such that for every input x, a random circuit from outputs 0 on x with overwhelming probability. We provide a combination of definitional, constructive, and impossibility results regarding obfuscation for evasive functions: 1 The (average case variants of the) notions of virtual black box obfuscation (Barak et al, CRYPTO '01) and virtual gray box obfuscation (Bitansky and Canetti, CRYPTO '10) coincide for evasive function families. We also define the notion of input-hiding obfuscation for evasive function families, stipulating that for a random it is hard to find, given, a value outside the preimage of 0. Interestingly, this natural definition, also motivated by applications, is likely not implied by the seemingly stronger notion of average-case virtual black-box obfuscation. 2 If there exist average-case virtual gray box obfuscators for all evasive function families, then there exist (quantitatively weaker) average-case virtual gray obfuscators for all function families. 3 There does not exist a worst-case virtual black box obfuscator even for evasive circuits, nor is there an average-case virtual gray box obfuscator for evasive Turing machine families. 4 Let be an evasive circuit family consisting of functions that test if a low-degree polynomial (represented by an efficient arithmetic circuit) evaluates to zero modulo some large prime p. Then under a natural analog of the discrete logarithm assumption in a group supporting multilinear maps, there exists an input-hiding obfuscator for. Under a new perfectly-hiding multilinear encoding assumption, there is an average-case virtual black box obfuscator for the family.
UR - http://www.scopus.com/inward/record.url?scp=84958540651&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-54242-8_2
DO - 10.1007/978-3-642-54242-8_2
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84958540651
SN - 9783642542411
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 26
EP - 51
BT - Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings
PB - Springer Verlag
T2 - 11th Theory of Cryptography Conference on Theory of Cryptography, TCC 2014
Y2 - 24 February 2014 through 26 February 2014
ER -