### Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model

Alice Pellet-Mary

##### Abstract

We present a quantum polynomial time attack against the GMMSSZ branching program obfuscator of Garg et al. (TCC'16), when instantiated with the GGH13 multilinear map of Garg et al. (EUROCRYPT'13). This candidate obfuscator was proved secure in the weak multilinear map model introduced by Miles et al. (CRYPTO'16). Our attack uses the short principal ideal solver of Cramer et al. (EUROCRYPT'16), to recover a secret element of the GGH13 multilinear map in quantum polynomial time. We then use this secret element to mount a (classical) polynomial time mixed-input attack against the GMMSSZ obfuscator. The main result of this article can hence be seen as a classical reduction from the security of the GMMSSZ obfuscator to the short principal ideal problem (the quantum setting is then only used to solve this problem in polynomial time). As an additional contribution, we explain how the same ideas can be adapted to mount a quantum polynomial time attack against the DGGMM obfuscator of Döttling et al. (ePrint 2016), which was also proved secure in the weak multilinear map model.

Available format(s)
Publication info
A minor revision of an IACR publication in CRYPTO 2018
Keywords
CryptanalysisObfuscation
Contact author(s)
alice pellet___mary @ ens-lyon fr
History
Short URL
https://ia.cr/2018/533

CC BY

BibTeX

@misc{cryptoeprint:2018/533,
author = {Alice Pellet-Mary},
title = {Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model},
howpublished = {Cryptology ePrint Archive, Paper 2018/533},
year = {2018},
note = {\url{https://eprint.iacr.org/2018/533}},
url = {https://eprint.iacr.org/2018/533}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.