Paper 2010/414

On Strong Simulation and Composable Point Obfuscation

Nir Bitansky and Ran Canetti

Abstract

The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be computed by an efficient simulator with only oracle access to the program. However, we know how to achieve this notion only for very restricted classes of programs. This work studies a simple relaxation of VBB: Allow the simulator unbounded computation time, while still allowing only polynomially many queries to the oracle. We then demonstrate the viability of this relaxed notion, which we call Virtual Grey Box (VGB), in the context of fully composable obfuscators for point programs: It is known that, w.r.t. VBB, if such obfuscators exist then there exist multi-bit point obfuscators (aka ``digital lockers'') and subsequently also very strong variants of encryption that are resilient to various attacks, such as key leakage and key-dependent-messages. However, no composable VBB-obfuscators for point programs have been shown. We show fully composable {\em VGB}-obfuscators for point programs under a strong variant of the Decision Diffie Hellman assumption. We show they suffice for the above applications and even for extensions to the public key setting as well as for encryption schemes with resistance to certain related key attacks (RKA).

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
A minor revision of an IACR publication in CRYPTO 2010
Keywords
ObfuscationStrong SimulationLeakage-ResilienceKey-Dependent MessagesRelated-Key Attacksdecision Diffie Hellman
Contact author(s)
nirbitan @ tau ac il
History
2013-09-07: revised
2010-07-26: received
See all versions
Short URL
https://ia.cr/2010/414
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/414,
      author = {Nir Bitansky and Ran Canetti},
      title = {On Strong Simulation and Composable Point Obfuscation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2010/414},
      year = {2010},
      url = {https://eprint.iacr.org/2010/414}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.