Cryptology ePrint Archive: Report 2018/1081

Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map

Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee

Abstract: We introduce a new type of cryptanalytic algorithm on the obfuscations based on the branching programs. Applying this algorithm to two recent general-purpose obfuscation schemes one by Chen et al. (CRYPTO 2018) and the other by Bartusek et al. (TCC 2018), we can show that they do not have the desired security. In other words, there exist two functionally equivalent branching programs whose obfuscated programs can be distinguished in polynomial time. Our strategy is to reduce the security problem of indistinguishability obfuscation into the distinguishing problem of two distributions where polynomially many samples are given. More precisely, we perform the obfuscating process ourselves with randomly chosen secret values to obtain identical and independent samples according to the distribution of evaluations of obfuscations. We then use the variance of samples as a new distinguisher of two functionally equivalent obfuscated programs. This statistical attack gives a new perspective on the security of the indistinguishability obfuscations: We should consider the shape of distributions of the evaluations of obfuscations to ensure the security. In other words, while most of the previous (weak) security proofs have been studied with respect to algebraic attack model or ideal model, our attack shows that this algebraic security is not enough to achieve indistinguishability obfuscation.

Disclaimer: The authors of BGMZ obfuscation (TCC'18) report that there are flaws of cryptanalysis of BGMZ obfuscation in Section 5. In particular, the current optimal parameter choice of BGMZ obfuscation is robust against our attack, while the attack lies outside the provable security of BGMZ obfuscation.

Category / Keywords: Cryptanalysis, indistinguishability obfuscation, multilinear map

Date: received 7 Nov 2018, last revised 13 Nov 2018

Contact author: tory154 at snu ac kr

Available format(s): PDF | BibTeX Citation

Note: We temporarily add the disclaimer not to mislead the readers and audiences of TCC. We will update the paper as soon as possible.

Version: 20181113:091514 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]