### Lower Bounds on Assumptions behind Indistinguishability Obfuscation

Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, and abhi shelat

##### Abstract

Since the seminal work of Garg et. al (FOCS'13) in which they proposed the first candidate construction for indistinguishability obfuscation (iO for short), iO has become a central cryptographic primitive with numerous applications. The security of the proposed construction of Garg et al. and its variants are proved based on multi-linear maps (Garg et. al Eurocrypt'13) and their idealized model called the graded encoding model (Brakerski and Rothblum TCC'14 and Barak et al. Eurocrypt'14). Whether or not iO could be based on standard and well-studied hardness assumptions has remain an elusive open question. In this work we prove emph{lower bounds} on the assumptions that imply iO in a black-box way, based on computational assumptions. Note that any lower bound for iO needs to somehow rely on computational assumptions, because if P = NP then statistically secure iO does exist. Our results are twofold: 1. There is no fully black-box construction of iO from (exponentially secure) collision-resistant hash functions unless the polynomial hierarchy collapses. Our lower bound extends to (separate iO from) any primitive implied by a random oracle in a black-box way. 2. Let P be any primitive that exists relative to random trapdoor permutations, the generic group model for any finite abelian group, or degree-$O(1)$ graded encoding model for any finite ring. We show that achieving a black-box construction of iO from P is emph{as hard as} basing public-key cryptography on one-way functions. In particular, for any such primitive P we present a constructive procedure that takes any black-box construction of iO from P and turns it into a a construction of semantically secure public-key encryption form any one-way functions. Our separations hold even if the construction of iO from P is {semi-} black-box (Reingold, Trevisan, and Vadhan, TCC'04) and the security reduction could access the adversary in a non-black-box way.

Available format(s)
Publication info
Keywords
Indistinguishability ObfuscationBlack-Box SeparationsLower Bounds.
Contact author(s)
mahmoody @ gmail com
History
Short URL
https://ia.cr/2015/1062

CC BY

BibTeX

@misc{cryptoeprint:2015/1062,
author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and abhi shelat},
title = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation},
howpublished = {Cryptology ePrint Archive, Paper 2015/1062},
year = {2015},
note = {\url{https://eprint.iacr.org/2015/1062}},
url = {https://eprint.iacr.org/2015/1062}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.