Cryptology ePrint Archive: Report 2017/541

Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives

Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed

Abstract: Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptography. However, currently all known constructions of IO are based on multilinear maps which are poorly understood. Hence, tremendous research effort has been put towards basing obfuscation on better-understood computational assumptions. Recently, another path to IO has emerged through functional encryption [Anath and Jain, CRYPTO 2015; Bitansky and Vaikuntanathan, FOCS 2015] but such FE schemes currently are still based on multi-linear maps. In this work, we study whether IO could be based on other powerful encryption primitives.

Separations for IO: We show that (assuming that the polynomial hierarchy does not collapse and one-way functions exist) IO cannot be constructed in a black-box manner from powerful all-or-nothing encryption primitives, such as witness encryption (WE), predicate encryption, and fully homomorphic encryption. What unifies these primitives is that they are of the ``all-or-nothing'' form, meaning either someone has the ``right key'' in which case they can decrypt the message fully, or they are not supposed to learn anything.

Stronger Model for Separations: One might argue that fully black-box uses of the considered encryption primitives limit their power too much because these primitives can easily lead to non-black-box constructions if the primitive is used in a self-feeding fashion --- namely, code of the subroutines of the considered primitive could easily be fed as input to the subroutines of the primitive itself. In fact, several important results (e.g., the construction of IO from functional encryption) follow this very recipe. In light of this, we prove our impossibility results with respect to a stronger model than the fully black-box framework of Impagliazzo and Rudich (STOC'89) and Reingold, Trevisan, and Vadhan (TCC'04) where the non-black-box technique of self-feeding is actually allowed.

Category / Keywords: Obfuscation, Witness Encryption, Predicate Encryption, Separations

Original Publication (in the same form): IACR-CRYPTO-2017

Date: received 5 Jun 2017

Contact author: mahmoody at gmail com, sanjamg@berkeley edu, am8zv@virginia edu

Available format(s): PDF | BibTeX Citation

Version: 20170608:155317 (All versions of this report)

Short URL: ia.cr/2017/541

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]