On the Complexity of Compressing Obfuscation

Gilad Asharov*, Ilan Komargodski, Rafael Pass, Naomi Sirkin

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to its far-reaching applications in cryptography and other fields. However, to date, obtaining a plausibly secure construction has been an illusive task, thus motivating the study of seemingly weaker primitives that imply it, with the possibility that they will be easier to construct. In this work, we provide a systematic study of compressing obfuscation, one of the most natural and simple to describe primitives that is known to imply indistinguishability obfuscation when combined with other standard assumptions. A compressing obfuscator is roughly an indistinguishability obfuscator that outputs just a slightly compressed encoding of the truth table. This generalizes notions introduced by Lin et al. (Functional signatures and pseudorandom functions, PKC, 2016) and Bitansky et al. (From Cryptomania to Obfustopia through secret-key functional encryption, TCC, 2016) by allowing for a broader regime of parameters. We view compressing obfuscation as an independent cryptographic primitive and show various positive and negative results concerning its power and plausibility of existence, demonstrating significant differences from full-fledged indistinguishability obfuscation. First, we show that as a cryptographic building block, compressing obfuscation is weak. In particular, when combined with one-way functions, it cannot be used (in a black-box way) to achieve public-key encryption, even under (sub-)exponential security assumptions. This is in sharp contrast to indistinguishability obfuscation, which together with one-way functions implies almost all cryptographic primitives. Second, we show that to construct compressing obfuscation with perfect correctness, one only needs to assume its existence with a very weak correctness guarantee and polynomial hardness. Namely, we show a correctness amplification transformation with optimal parameters that relies only on polynomial hardness assumptions. This implies a universal construction assuming only polynomially secure compressing obfuscation with approximate correctness. In the context of indistinguishability obfuscation, we know how to achieve such a result only under sub-exponential security assumptions together with derandomization assumptions. Lastly, we characterize the existence of compressing obfuscation with statistical security. We show that in some range of parameters and for some classes of circuits such an obfuscator exists, whereas it is unlikely to exist with better parameters or for larger classes of circuits. These positive and negative results reveal a deep connection between compressing obfuscation and various concepts in complexity theory and learning theory.

Original languageEnglish
Article number21
Pages (from-to)1-78
Number of pages78
JournalJournal of Cryptology
Volume35
Issue number3
DOIs
StatePublished - Jul 2022

Bibliographical note

Funding Information:
We thank Zvika Brakerski for discussions about the possibility of SXiO and XiO with statistical security. This work is supported in part by a Junior Fellow award from the Simons Foundation, by the Israel Science Foundation (Grants no. 2439/20 and 1774/20), by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office, by the European Union’s Horizon 2020 research and innovation program under the Marie Skłodowska-Curie grant agreement No. 891234, by a Packard Foundation Fellowship, by an AFOSR grant FA9550-15-1-0262, by an Alon Young Faculty Fellowship, by NSF Award CNS-1561209, NSF Award CNS-1217821, NSF Award CNS-1704788, a Microsoft Faculty Fellowship, and a Google Faculty Research Award.

Publisher Copyright:
© 2022, International Association for Cryptologic Research.

Fingerprint

Dive into the research topics of 'On the Complexity of Compressing Obfuscation'. Together they form a unique fingerprint.

Cite this