Black-box obfuscation for d-CNFs

Zvika Brakerski, G. Rothblum
{"title":"Black-box obfuscation for d-CNFs","authors":"Zvika Brakerski, G. Rothblum","doi":"10.1145/2554797.2554820","DOIUrl":null,"url":null,"abstract":"We show how to securely obfuscate a new class of functions: conjunctions of NC0d circuits. These are functions of the form C(→/x) = ∧mi=1 C1(→/x), where each C1 is a boolean NC0d circuits circuit, whose output bit is only a function of d = O(1) bits of the input →/x. For example, d-CNFs, where each clause is a disjunction of at most d variables, are in this class. Given such a function, we produce an obfuscated program that preserves the input-output functionality of the given function, but reveals nothing else. Our construction is based on multilinear maps, and can be instantiated using the recent candidates proposed by Garg, Gentry and Halevi (EUROCRYPT 2013) and by Coron, Lepoint and Tibouchi (CRYPTO 2013). We prove that the construction is a secure obfuscation in a generic multilinear group model, under the black-box definition of Barak et al. (CRYPTO 2001). Security is based on a new worst-case hardness assumption about exponential hardness of the NP-complete problem 3-SAT, the Bounded Speedup Hypothesis. One of the new techniques we introduce is a method for enforcing input consistency, which we call randomizing sub-assignments. We hope that this technique can find further application in constructing secure obfuscators. The family of functions we obfuscate is considerably richer than previous works that consider black-box obfuscation. As one application, we show how to achieve obfuscated functional point testing: namely, to construct a circuit that checks whether ƒ(→/x) = →/y, where ƒ is an arbitrary \"public\" polynomial-time computable function, but →/y is a \"secret\" point that is hidden in the obfuscation.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 5th conference on Innovations in theoretical computer science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2554797.2554820","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 37

Abstract

We show how to securely obfuscate a new class of functions: conjunctions of NC0d circuits. These are functions of the form C(→/x) = ∧mi=1 C1(→/x), where each C1 is a boolean NC0d circuits circuit, whose output bit is only a function of d = O(1) bits of the input →/x. For example, d-CNFs, where each clause is a disjunction of at most d variables, are in this class. Given such a function, we produce an obfuscated program that preserves the input-output functionality of the given function, but reveals nothing else. Our construction is based on multilinear maps, and can be instantiated using the recent candidates proposed by Garg, Gentry and Halevi (EUROCRYPT 2013) and by Coron, Lepoint and Tibouchi (CRYPTO 2013). We prove that the construction is a secure obfuscation in a generic multilinear group model, under the black-box definition of Barak et al. (CRYPTO 2001). Security is based on a new worst-case hardness assumption about exponential hardness of the NP-complete problem 3-SAT, the Bounded Speedup Hypothesis. One of the new techniques we introduce is a method for enforcing input consistency, which we call randomizing sub-assignments. We hope that this technique can find further application in constructing secure obfuscators. The family of functions we obfuscate is considerably richer than previous works that consider black-box obfuscation. As one application, we show how to achieve obfuscated functional point testing: namely, to construct a circuit that checks whether ƒ(→/x) = →/y, where ƒ is an arbitrary "public" polynomial-time computable function, but →/y is a "secret" point that is hidden in the obfuscation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
d-CNFs的黑箱混淆
我们展示了如何安全地混淆一类新的函数:NC0d电路的连接。这些函数的形式是C(→/x) =∧mi=1 C1(→/x),其中每个C1都是一个布尔NC0d电路,其输出位仅是输入→/x的d = O(1)位的函数。例如,d- cnfs,其中每个子句是最多d个变量的析取,就属于这类。给定这样一个函数,我们生成一个混淆的程序,它保留了给定函数的输入输出功能,但没有显示任何其他功能。我们的构建基于多线性地图,并且可以使用Garg, Gentry和Halevi (EUROCRYPT 2013)以及Coron, Lepoint和Tibouchi (CRYPTO 2013)最近提出的候选地图进行实例化。在Barak等人(CRYPTO 2001)的黑盒定义下,我们证明了该构造是一个一般多线性群模型中的安全混淆。安全性是基于np完全问题3-SAT的指数硬度的一个新的最坏情况硬度假设,即有界加速假设。我们引入的新技术之一是一种强制输入一致性的方法,我们称之为随机子分配。我们希望该技术能够在构建安全混淆器中得到进一步的应用。我们混淆的函数族比以前考虑黑盒混淆的工作要丰富得多。作为一个应用,我们展示了如何实现混淆功能点测试:即构造一个电路来检查是否有(→/x) =→/y,其中,f是一个任意的“公开”多项式时间可计算函数,而→/y是隐藏在混淆中的“秘密”点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On the automorphism groups of strongly regular graphs I Coordination mechanisms from (almost) all scheduling policies Session details: Session 10: 10:30--10:40 Cryptogenography Rational arguments: single round delegation with sublinear verification
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1