Nir Bitansky and Omer Paneth. Program Obfuscation.

41
On the Impossibility of Approximate Obfuscation Nir Bitansky and Omer Paneth

Transcript of Nir Bitansky and Omer Paneth. Program Obfuscation.

Page 1: Nir Bitansky and Omer Paneth. Program Obfuscation.

On the Impossibility of Approximate Obfuscation

Nir Bitansky and Omer Paneth

Page 2: Nir Bitansky and Omer Paneth. Program Obfuscation.

Program Obfuscation

Compute

𝑥

𝑦= 𝑓 𝑠𝑘(𝑥 )

Page 3: Nir Bitansky and Omer Paneth. Program Obfuscation.

Program Obfuscation𝑥

𝑦= 𝑓 𝑠𝑘(𝑥 )

Page 4: Nir Bitansky and Omer Paneth. Program Obfuscation.

Program Obfuscation

Sign email with If starts with

[email protected]

𝑥

𝑦=𝜎 (𝑥)/⊥

Page 5: Nir Bitansky and Omer Paneth. Program Obfuscation.

Virtual Black-Box

is an obfuscation of :

- Functionality:

𝑆𝑓 𝑠𝑘

𝐴 ≈𝒪𝑠𝑘

- Security:

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Page 6: Nir Bitansky and Omer Paneth. Program Obfuscation.

Impossibility of Obfuscation

There exist families of functions that cannot be obfuscated

[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

Page 7: Nir Bitansky and Omer Paneth. Program Obfuscation.

Relaxed Security

- Functionality:

𝑆𝑓 𝑠𝑘

𝐴 ≈𝒪𝑠𝑘

- Security:

[Barak et al. 01, Goldwasser-Rothblum07, Hofheinz-Malone-Lee-Stam07, Hohenberger-Rothblum-Shelat-Vaikuntanathan07,

Bitansky-Canetti10]

Page 8: Nir Bitansky and Omer Paneth. Program Obfuscation.

Relaxed Functionality?

- Functionality:

𝑆𝑓 𝑠𝑘

𝐴 ≈𝒪𝑠𝑘

- Security:

Page 9: Nir Bitansky and Omer Paneth. Program Obfuscation.

Approximate Obfuscation[Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang 01]

is an approximate obfuscation of :

- Functionality:

𝑆𝑓 𝑠𝑘

𝐴 ≈𝒪𝑠𝑘

- Security:

Page 10: Nir Bitansky and Omer Paneth. Program Obfuscation.

Main Result

Assuming trapdoor permutations, there exist families of functions that cannot be approximately

obfuscated

Motivation?

Positive applications

Page 11: Nir Bitansky and Omer Paneth. Program Obfuscation.

From Impossibility to Applications

Impossibility of approximate obfuscation

Non-black-box extraction

𝐴𝑠𝑘𝑥 𝑓 𝑠𝑘(𝑥 )

𝑠𝑘

Zero-knowledge

with

resettable security

Worst-case

extractable

signatures

Page 12: Nir Bitansky and Omer Paneth. Program Obfuscation.

Plan[BGIRSVY 01]:

This work:

Impossibility of Obfuscation

Impossibility of Approximate Obfuscation

Unobfuscatable Functions

Robust Unobfuscatable

Functions

Applications

Page 13: Nir Bitansky and Omer Paneth. Program Obfuscation.

Unobfuscatable Functions

𝐴𝑓 𝑠𝑘

𝑠𝑘

𝐸𝒪 𝑠𝑘

1. Black-box unlearnability:

:

2. Extraction: Pr𝑥←𝑈

[𝒪 (𝑥 )= 𝑓 𝑠𝑘 (𝑥 ) ]=1⇒

From Barak et al.

Page 14: Nir Bitansky and Omer Paneth. Program Obfuscation.

Robust Unobfuscatable Functions

1. Black-box unlearnability:

:

2. Robust extraction: 𝐴𝑓 𝑠𝑘

𝑠𝑘

𝐸𝒪 𝑠𝑘Pr𝑥←𝑈

[𝒪 (𝑥 )= 𝑓 𝑠𝑘 (𝑥 ) ]>0 .9⇒

Page 15: Nir Bitansky and Omer Paneth. Program Obfuscation.

Robust Unobfuscatable Functions

𝑓 𝑠𝑘𝒪𝑆𝑓 𝑠𝑘

𝐴 ≈𝒪𝑠𝑘𝑠𝑘

𝐸

Page 16: Nir Bitansky and Omer Paneth. Program Obfuscation.

RUFs Construction

Page 17: Nir Bitansky and Omer Paneth. Program Obfuscation.

Unobfuscatable FunctionsConstruction of Barak et al. (using FHE for simplicity)

– two -bit strings - secret key for FHE

𝑓 𝑎 ,𝑏 , 𝑠𝑘 (𝑥 ) :

Page 18: Nir Bitansky and Omer Paneth. Program Obfuscation.

𝑓 𝑎 ,𝑏 , 𝑠𝑘(𝑥 )¿ {¿¿𝑥=𝑎𝑥=0𝑛De c𝑠𝑘(𝑥)=𝑏o . w .

En c𝑠𝑘(𝑎)𝑏

𝑏

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

𝑓

𝑓

𝑓

Unobfuscatable Functions

Page 19: Nir Bitansky and Omer Paneth. Program Obfuscation.

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

𝑓

𝑓

𝑓

Black-Box Unlearnability

𝐴𝑓𝑏

Page 20: Nir Bitansky and Omer Paneth. Program Obfuscation.

𝐶

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

Extraction

𝐸𝐶≡ 𝑓 𝑏

𝐸𝑣𝑎𝑙 (𝐶 )𝐶𝐶

𝐶

Page 21: Nir Bitansky and Omer Paneth. Program Obfuscation.

0𝑛 𝐸𝑛𝑐 (𝑎) 𝐸𝑛𝑐 (b )

𝑎 𝑏

Robust Extraction?

𝐸

𝐶∗𝐶∗

𝐶∗ 𝑏 𝐶∗(𝑥)={ ⊥𝐸𝑛𝑐𝑠𝑘(𝑎)

𝑥=𝑎𝑥=0𝑛

𝑏⊥

𝐷𝑒𝑐𝑠 𝑘(𝑥 )=𝑏𝑜 .𝑤 .

Page 22: Nir Bitansky and Omer Paneth. Program Obfuscation.

A Taste of the Construction

𝑓 𝑎 ,𝑏(𝑥)={𝑏 𝑥=𝑎⊥ 𝑜 .𝑤 .

Q: Find such that:

with errors 𝑓 a , b

Randomly reduce to

Page 23: Nir Bitansky and Omer Paneth. Program Obfuscation.

Getting Robustness

𝑓 𝑎 ,𝑏(𝑥)={𝑏 𝑥=𝑎⊥ 𝑜 .𝑤 .

Page 24: Nir Bitansky and Omer Paneth. Program Obfuscation.

with errors 𝑓 a , b

𝑔

h𝑎𝑟

𝑎⊕𝑟 ⊕

𝑟←𝑈𝑏⊕PRF (𝑟 )

PRF (𝑟 )

𝑓

Page 25: Nir Bitansky and Omer Paneth. Program Obfuscation.

𝑔 , h 𝑓 a , b

𝐴𝑔 , h

𝑏

𝑎 𝑎 queries on and queries on

Page 26: Nir Bitansky and Omer Paneth. Program Obfuscation.

Construction of RUFs

¿ { 𝑏𝐸𝑛𝑐𝑠 𝑘(𝑎)

𝑥=𝑎𝑥=0𝑛

𝑏⊥

𝐷𝑒𝑐𝑠𝑘(𝑥)=𝑏𝑜 .𝑤 .

𝑓 𝑎 ,𝑏 , 𝑠𝑘(𝑥 )

Page 27: Nir Bitansky and Omer Paneth. Program Obfuscation.

• RUFs from trapdoor permutations.

• Weak RUFs from OWF only:

Assumptions

𝐸𝒪 𝑠𝑘

∀ 𝑥 :𝒪 (𝑥 )∈ { 𝑓 𝑠𝑘 (𝑥 ) ,⊥}

Page 28: Nir Bitansky and Omer Paneth. Program Obfuscation.

Applications

Page 29: Nir Bitansky and Omer Paneth. Program Obfuscation.

Publicly-Verifiable RUOFs

𝐴𝑓 𝑠𝑘

𝑠𝑘 𝐸𝒪 𝑠𝑘

iff

𝑣𝑘 𝑣𝑘

𝑠𝑘,𝑣𝑘←Gen () Pr𝑥←𝑈

[Ver𝑣𝑘 (𝑥 ,𝒪 (𝑥 ) )=1 ]> 1poly(𝑛)

Page 30: Nir Bitansky and Omer Paneth. Program Obfuscation.

Resettably-Sound ZK[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

𝑥∈ℒ?𝒫Standard ZK

ResettableSoundnes

s𝒱

Page 31: Nir Bitansky and Omer Paneth. Program Obfuscation.

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

𝒱𝒫∗𝑥∉ℒ

Page 32: Nir Bitansky and Omer Paneth. Program Obfuscation.

Resettable Soundness[Micali-Reyzin 01, Barak-Goldreich-Goldwasser-Lindell 01]

𝒱𝒫∗𝑥∉ℒ𝒱

Page 33: Nir Bitansky and Omer Paneth. Program Obfuscation.

No Black-Box Simulator

𝒱𝒫∗

Resettable soundness Zero-knowledge(black-box simulator) 𝒫∗

𝒱 𝒮𝒱∗

[Barak-Goldreich-Goldwasser-Lindell 01]

Page 34: Nir Bitansky and Omer Paneth. Program Obfuscation.

Resettably-Sound ZK

𝒱𝒫∗ 𝒮𝒱∗

Resettable soundness Zero-knowledge (non-black-box simulator)𝒫∗

𝒱

[Barak-Goldreich-Goldwasser-Lindell 01, BP 12, Chung-Pass-Seth 13]

Page 35: Nir Bitansky and Omer Paneth. Program Obfuscation.

𝒫 𝒱Resettably-Sound ZK

𝑠𝑘,𝑣𝑘𝑣𝑘

𝑥←𝑈𝑓 𝑠𝑘(𝑥 )

Witness indistinguishable

proof:

or “knows”

Page 36: Nir Bitansky and Omer Paneth. Program Obfuscation.

𝒫 𝒱Resettably-Sound ZK

𝑠𝑘,𝑣𝑘𝑣𝑘

𝑥𝑓 𝑠𝑘(𝑥 )

Witness indistinguishable

proof:

or “knows”

Page 37: Nir Bitansky and Omer Paneth. Program Obfuscation.

𝒱𝒫∗𝑥𝑓 𝑠𝑘(𝑥 )

Analysis

𝒮 𝑖𝑚𝒱∗

Resettable soundness Zero-knowledge

𝒫∗𝑓 𝑠𝑘

𝑠𝑘

𝒮𝑠𝑘

𝐸

Page 38: Nir Bitansky and Omer Paneth. Program Obfuscation.

• Resettably-sound ZK from OWFs

(Different approach from Chung-Pass-Seth 13)

• Simultaneously-resettable ZK from OWFs

(using srWI by Chung-Ostrovsky-Pass-Visconti

13)

• 4-message resettably-sound ZK

• 3-message simultaneously-resettable

WI proof of knowledge

More Resettable Crypto

Page 39: Nir Bitansky and Omer Paneth. Program Obfuscation.

Sign 𝑠𝑘

Sign 𝑠𝑘

𝐴𝑚 𝑖

𝜎 (𝑚

¿¿𝑖)¿

𝑣𝑘

Digital Signatures:

Worst-Case Extractable Signatures

∀𝑠𝑘 ,𝑣𝑘

Page 40: Nir Bitansky and Omer Paneth. Program Obfuscation.

Worst-Case Extractable Signatures

For every

breaks security for ⟹

𝐴

𝐸𝑠𝑘

Page 41: Nir Bitansky and Omer Paneth. Program Obfuscation.

Thank You.#define _ -F<00||--F-OO--;int F=00,OO=00;main(){F_OO();printf("%1.3f\n",4.*-F/OO/OO);}F_OO(){

_-_-_-_ _-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_-_-_-_-_ _-_-_-_-_-_-_-_ _-_-_-_

}

IOCCC 88