Limits on the Power of Indistinguishability Obfuscation and Functional Encryption

被引:31
|
作者
Asharov, Gilad [1 ]
Segev, Gil [1 ]
机构
[1] Hebrew Univ Jerusalem, IL-91904 Jerusalem, Israel
关键词
BOUNDS;
D O I
10.1109/FOCS.2015.21
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a "central hub" for almost all known cryptographic tasks, and as an extremely powerful building block for new cryptographic tasks resolving long-standing and foundational open problems. However, constructions based on indistinguishability obfuscation almost always rely on non-black-box techniques, and thus the extent to which it can be used as a building block in cryptographic constructions has been completely unexplored so far. We present a framework for proving meaningful negative results on the power of indistinguishability obfuscation. By considering indistinguishability obfuscation for oracle-aided circuits, we capture the common techniques that have been used so far in constructions based on indistinguishability obfuscation. These include, in particular, non-black-box techniques such as the punctured programming approach of Sahai and Waters (STOC '14) and its variants, as well as sub-exponential security assumptions. Within our framework we prove the first negative results on the power of indistinguishability obfuscation and of the tightly related notion of functional encryption. Our results are as follows: There is no fully black-box construction of a collision-resistant function family from an indistinguishability obfuscator for oracle-aided circuits. There is no fully black-box construction of a key-agreement protocol with perfect completeness from a private-key functional encryption scheme for oracle-aided circuits. Specifically, we prove that any such potential constructions must suffer from an exponential security loss, and thus our results cannot be circumvented using sub-exponential security assumptions. Our framework captures constructions that may rely on a wide variety of primitives in a non-black-box manner (e.g., obfuscating or generating a functional key for a function that uses the evaluation circuit of a puncturable pseudorandom function), and we only assume that the underlying indistinguishability obfuscator or functional encryption scheme themselves are used in a black-box manner.
引用
收藏
页码:191 / 209
页数:19
相关论文
共 50 条
  • [1] LIMITS ON THE POWER OF INDISTINGUISHABILITY OBFUSCATION AND FUNCTIONAL ENCRYPTION
    Asharov, Gilad
    Segev, Gil
    [J]. SIAM JOURNAL ON COMPUTING, 2016, 45 (06) : 2117 - 2176
  • [2] Indistinguishability Obfuscation from Functional Encryption
    Bitansky, Nir
    Vaikuntanathan, Vinod
    [J]. 2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2015, : 171 - 190
  • [3] Indistinguishability Obfuscation from Functional Encryption
    Bitansky, Nir
    Vaikuntanathan, Vinod
    [J]. JOURNAL OF THE ACM, 2018, 65 (06)
  • [4] Indistinguishability Obfuscation from Compact Functional Encryption
    Ananth, Prabhanjan
    Jain, Abhishek
    [J]. ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 308 - 326
  • [5] CANDIDATE INDISTINGUISHABILITY OBFUSCATION AND FUNCTIONAL ENCRYPTION FOR ALL CIRCUITS
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Raykova, Mariana
    Sahai, Amit
    Waters, Brent
    [J]. SIAM JOURNAL ON COMPUTING, 2016, 45 (03) : 882 - 929
  • [6] Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
    Ananth, Prabhanjan
    Jain, Aayush
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 91 - 121
  • [7] Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits (Extended Abstract)
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Raykova, Mariana
    Sahai, Amit
    Waters, Brent
    [J]. 2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2013, : 40 - 49
  • [8] Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
    Arriaga, Afonso
    Barbosa, Manuel
    Farshim, Pooya
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 227 - 247
  • [9] How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
    Sahai, Amit
    Waters, Brent
    [J]. STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2014, : 475 - 484
  • [10] Proxy re-encryption via indistinguishability obfuscation
    Ohata, Satsuya
    Matsuura, Kanta
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1786 - 1795