Structure-preserving compilers from new notions of obfuscations
M Campanelli, D Francati, C Orlandi - IACR International Conference on …, 2023 - Springer
M Campanelli, D Francati, C Orlandi
IACR International Conference on Public-Key Cryptography, 2023•SpringerThe dream of software obfuscation is to take programs, as they are, and then generically
compile them into obfuscated versions that hide their secret inner workings. In this work we
investigate notions of obfuscations weaker than virtual black-box (VBB) but which still allow
obfuscating cryptographic primitives preserving their original functionalities as much as
possible. In particular we propose two new notions of obfuscations, which we call oracle-
differing-input obfuscation (odiO) and oracle-indistinguishability obfuscation (oiO). In a …
compile them into obfuscated versions that hide their secret inner workings. In this work we
investigate notions of obfuscations weaker than virtual black-box (VBB) but which still allow
obfuscating cryptographic primitives preserving their original functionalities as much as
possible. In particular we propose two new notions of obfuscations, which we call oracle-
differing-input obfuscation (odiO) and oracle-indistinguishability obfuscation (oiO). In a …
Abstract
The dream of software obfuscation is to take programs, as they are, and then generically compile them into obfuscated versions that hide their secret inner workings. In this work we investigate notions of obfuscations weaker than virtual black-box () but which still allow obfuscating cryptographic primitives preserving their original functionalities as much as possible.
In particular we propose two new notions of obfuscations, which we call oracle-differing-input obfuscation () and oracle-indistinguishability obfuscation (). In a nutshell, is a natural strengthening of differing-input obfuscation () and allows obfuscating programs for which it is hard to find a differing-input when given only oracle access to the programs. An obfuscator allows to obfuscate programs that are hard to distinguish when treated as oracles.
We then show applications of these notions, as well as positive and negative results around them. A few highlights include:
- Our new notions are weaker than and stronger than .
- As it is the case for , we show that there exist programs that cannot be obfuscated with or .
- Our new notions allow to generically compile several flavours of secret-key primitives (e.g., SKE, MAC, designated verifier NIZK) into their public-key equivalent (e.g., PKE, signatures, publicly verifiable NIZK) while preserving one of the algorithms of the original scheme (function-preserving), or the structure of their outputs (format-preserving).
Springer
Showing the best result for this search. See all results