skip to main content
10.1145/1060590.1060669acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

On obfuscating point functions

Published:22 May 2005Publication History

ABSTRACT

We investigate the possibility of obfuscating point functions in the framework of Barak et al. from Crypto '01. A point function is a Boolean function that assumes the value 1 at exactly one point. Our main results are as follows:We provide a simple construction of efficient obfuscators for point functions for a slightly relaxed notion of obfuscation, for which obfuscating general circuits is nonetheless impossible. Our construction relies on the existence of a very strong one-way permutation, and yields the first non-trivial obfuscator under general assumptions in the standard model. We also obtain obfuscators for point functions with multi-bit output and for prefix matching.Our assumption is that there is a one-way permutation wherein any polynomial-sized circuit inverts the permutation on at most a polynomial number of inputs. We show that a similar assumption is in fact necessary, and that our assumption holds relative to a random permutation oracle.Finally, we establish two impossibility results which indicate that the limitations on our construction, namely simulating only adversaries with single-bit output and using nonuniform advice in our simulator, are in some sense inherent.Previous work gave negative results for the general class of circuits (Barak et al., Crypto '01) and positive results in the random oracle model (Lynn et al., Eurocrypt '04) or under non-standard number-theoretic assumptions (Canetti, Crypto '97). This work represents the first effort to bridge the gap between the two for a natural class of functionalities.

References

  1. B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Proc. Crypto '01, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal of Computing, 13(4):850--864, 1984.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Proc. Crypto '97, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proc. 30th STOC, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Canetti, D. Micciancio, and O. Reingold. Perfectly one-way probabilistic hash functions. In Proc. 30th STOC, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. Dodis and A. Smith. Correcting errors without leaking partial information. In these proceedings, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Dwork, M. Naor, and A. Sahai. Concurrent zero-knowledge. In Proc. 30th STOC, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Gennaro and L. Trevisan. Lower bounds on efficiency of generic cryptographic constructions. In Proc. 41st FOCS, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. O. Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM Journal on Computing, 25(1):169--192, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. O. Goldreich and L. Levin. Hard-core predicates for any one-way function. In Proc. 21st STOC, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Linial, Y. Mansour, and N. Nissan. Constant depth circuits, fourier transform, and learnability. Journal of the ACM, 40(3):607--620, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Lubotzky, R. Philips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8(3):261--277, 1988.]]Google ScholarGoogle ScholarCross RefCross Ref
  14. M. Luby. Pseudorandomness and Cryptographic Applications. Princeton University Press, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Lynn, M. Prabhakaran, and A. Sahai. Positive results and techniques for obfuscation. In Proc. Eurocrypt '04, 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  16. J. B. Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In Proc. Crypto '02, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Wagner and I. Goldberg. Proofs of security for the unix password hashing algorithm. In Proc. Asiacrypt '00, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, 1982.]]Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. On obfuscating point functions

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
      May 2005
      778 pages
      ISBN:1581139608
      DOI:10.1145/1060590

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 May 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Author Tags

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader