On The Complexity of Compressing Obfuscation Gilad Asharov, Naomi - - PowerPoint PPT Presentation

on the complexity of compressing obfuscation
SMART_READER_LITE
LIVE PREVIEW

On The Complexity of Compressing Obfuscation Gilad Asharov, Naomi - - PowerPoint PPT Presentation

On The Complexity of Compressing Obfuscation Gilad Asharov, Naomi Ephraim, Ilan Komargodski, and Rafael Pass Cornell University and Cornell Tech CRYPTO 2018 Indistinguishability Obfuscation (iO) An obfuscator is a compiler which preserves


slide-1
SLIDE 1

On The Complexity of Compressing Obfuscation

Gilad Asharov, Naomi Ephraim, Ilan Komargodski, and Rafael Pass

Cornell University and Cornell Tech CRYPTO 2018

slide-2
SLIDE 2

Indistinguishability Obfuscation (iO)

C

iO

C

An obfuscator is a compiler which

  • preserves functionality
  • obfuscated circuit is “unintelligible”
slide-3
SLIDE 3

Indistinguishability Obfuscation (iO)

C

iO

C

An obfuscator is a compiler which

x y x y

  • preserves functionality
  • obfuscated circuit is “unintelligible”
slide-4
SLIDE 4

Indistinguishability Obfuscation (iO)

C

iO

C

An obfuscator is a compiler which

x y x y

If C0 and C1 compute the same function and |C0|=|C1|, then iO(C0) and iO(C1) are hard to distinguish

  • preserves functionality
  • obfuscated circuit is “unintelligible”
slide-5
SLIDE 5

Power of iO

slide-6
SLIDE 6

Power of iO

iO

+ standard assumptions

Public-key encryption [SW14] Trapdoor permutations [BPW15] Non-interactive zero knowledge [SW14] One-way functions [KMN+14]

Classical Crypto

slide-7
SLIDE 7

Fully homomorphic encryption [CLT+15]

Modern Crypto

Power of iO

iO

+ standard assumptions

Public-key encryption [SW14] Trapdoor permutations [BPW15] Non-interactive zero knowledge [SW14] One-way functions [KMN+14]

Classical Crypto

slide-8
SLIDE 8

Multi-input functional encryption [GGG+14, BKS16] Deniable encryption [SW14] Cryptographic hardness of PPAD [BPR15] Constant-round concurrent zero knowledge [CLP15]

Many more!

Fully homomorphic encryption [CLT+15]

Modern Crypto

Power of iO

iO

+ standard assumptions

Public-key encryption [SW14] Trapdoor permutations [BPW15] Non-interactive zero knowledge [SW14] One-way functions [KMN+14]

Classical Crypto

slide-9
SLIDE 9

Reduce iO to seemingly weaker building blocks

Existence of iO

slide-10
SLIDE 10

Reduce iO to seemingly weaker building blocks

cryptographic building block

iO

Existence of iO

slide-11
SLIDE 11

Reduce iO to seemingly weaker building blocks Reduce the existence of iO to new concrete assumptions

cryptographic building block

iO

Existence of iO

slide-12
SLIDE 12

Reduce iO to seemingly weaker building blocks Reduce the existence of iO to new concrete assumptions In all of these, the assumption is nonstandard and is vulnerable to attacks

[ADGM17,BBKK17,BWZ14,CGH17,CHLRS15,GHMS14,LV17,MSZ16]

cryptographic building block

iO

Existence of iO

slide-13
SLIDE 13

Reduce the existence of iO to new concrete assumptions In all of these, the assumption is nonstandard and is vulnerable to attacks

cryptographic building block

iO

Existence of iO

[ADGM17,BBKK17,BWZ14,CGH17,CHLRS15,GHMS14,LV17,MSZ16]

Reduce iO to seemingly weaker building blocks

slide-14
SLIDE 14

Compact public-key functional encryption (FE) [AJ15,BV15] Collusion- Resistant Secret- Key FE [FKT18]

Compact Randomized Encodings [LPST16]

iO

Existence of iO

slide-15
SLIDE 15

Compact public-key functional encryption (FE) [AJ15,BV15] Collusion- Resistant Secret- Key FE [FKT18]

Compact Randomized Encodings [LPST16]

iO

+ OWF

Existence of iO

slide-16
SLIDE 16

Compact public-key functional encryption (FE) [AJ15,BV15] Collusion- Resistant Secret- Key FE [FKT18]

Compact Randomized Encodings [LPST16]

iO

+ OWF

Existence of iO

What is the weakest building block that implies iO?

slide-17
SLIDE 17

What is the weakest building block that implies iO?

Compact public-key functional encryption (FE) [AJ15,BV15] Collusion- Resistant Secret- Key FE [FKT18]

iO

+ OWF

Existence of iO

All building blocks require some form of compression

Compact Randomized Encodings [LPST16]

slide-18
SLIDE 18

What is the weakest building block that implies iO?

Compact public-key functional encryption (FE) [AJ15,BV15] Collusion- Resistant Secret- Key FE [FKT18]

iO

+ OWF

Existence of iO

All building blocks require some form of compression

Ciphertexts are “short”

Compact Randomized Encodings [LPST16]

slide-19
SLIDE 19

What is the weakest building block that implies iO?

Compact public-key functional encryption (FE) [AJ15,BV15] Collusion- Resistant Secret- Key FE [FKT18]

iO

+ OWF

Existence of iO

All building blocks require some form of compression

Ciphertexts are “short”

Ciphertexts don’t grow with number of functional keys

Compact Randomized Encodings [LPST16]

slide-20
SLIDE 20

What is the weakest building block that implies iO?

Compact public-key functional encryption (FE) [AJ15,BV15] Collusion- Resistant Secret- Key FE [FKT18]

iO

+ OWF

Existence of iO

All building blocks require some form of compression

Ciphertexts are “short”

Ciphertexts don’t grow with number of functional keys

Compact Randomized Encodings [LPST16]

Encoding time is “small”

slide-21
SLIDE 21

Compressing Obfuscation

A (t,ℓ)-compressing obfuscator has: Time to obfuscate is t(s,n) Size of the obfuscation is ℓ(s,n)

time t(s,n)

C

|C| = s

n

|iO(C)| = ℓ(s,n)

This talk: circuits C

  • Size s
  • input length n

C

iO

slide-22
SLIDE 22

t(s,n)= ℓ(s,n)=

Compressing Obfuscation

This talk: circuits C

  • Size s
  • input length n

A (t,ℓ)-compressing obfuscator has: Time to obfuscate is t(s,n) Size of the obfuscation is ℓ(s,n)

slide-23
SLIDE 23

t(s,n)= ℓ(s,n)=

Compressing Obfuscation

iO poly(s) poly(s)

This talk: circuits C

  • Size s
  • input length n

A (t,ℓ)-compressing obfuscator has: Time to obfuscate is t(s,n) Size of the obfuscation is ℓ(s,n)

slide-24
SLIDE 24

t(s,n)= ℓ(s,n)= Trivial 2n · s 2n

Compressing Obfuscation

iO poly(s) poly(s)

This talk: circuits C

  • Size s
  • input length n

A (t,ℓ)-compressing obfuscator has: Time to obfuscate is t(s,n) Size of the obfuscation is ℓ(s,n)

slide-25
SLIDE 25

t(s,n)= ℓ(s,n)= Trivial 2n · s 2n

Compressing Obfuscation

iO poly(s) poly(s)

This talk: circuits C

  • Size s
  • input length n

time = |truth table| size = smaller than truth table

XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s)

A (t,ℓ)-compressing obfuscator has: Time to obfuscate is t(s,n) Size of the obfuscation is ℓ(s,n)

slide-26
SLIDE 26

t(s,n)= ℓ(s,n)= Trivial 2n · s 2n

Compressing Obfuscation

iO poly(s) poly(s)

This talk: circuits C

  • Size s
  • input length n

time = |truth table| size = smaller than truth table

XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s)

time and size smaller than truth table

SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

A (t,ℓ)-compressing obfuscator has: Time to obfuscate is t(s,n) Size of the obfuscation is ℓ(s,n)

slide-27
SLIDE 27

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

Strength of assumption

Compression Hierarchy

iO poly(s) poly(s) Trivial 2n · s 2n

slide-28
SLIDE 28

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

+LWE

Strength of assumption

Compression Hierarchy

iO poly(s) poly(s) Trivial 2n · s 2n

slide-29
SLIDE 29

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

+LWE

+OWF [KNT18]

Strength of assumption

Compression Hierarchy

iO poly(s) poly(s) Trivial 2n · s 2n

slide-30
SLIDE 30

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

+LWE

+OWF [KNT18]

Strength of assumption

Compression Hierarchy

sub- exponential security

iO poly(s) poly(s) Trivial 2n · s 2n

slide-31
SLIDE 31

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

+LWE

+OWF [KNT18]

Strength of assumption

Compression Hierarchy

sub- exponential security

+ OWF = “holy grail”

iO poly(s) poly(s) Trivial 2n · s 2n

slide-32
SLIDE 32

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

+LWE

+OWF [KNT18]

Strength of assumption

Compression Hierarchy

sub- exponential security

+ OWF = “holy grail”

iO poly(s) poly(s)

[MMN+16, GMM17]

Trivial 2n · s 2n

slide-33
SLIDE 33

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

+LWE

+OWF [KNT18]

Strength of assumption

Compression Hierarchy

sub- exponential security

+ OWF = “holy grail”

Can we use

  • nly OWF?

iO poly(s) poly(s)

[MMN+16, GMM17]

Trivial 2n · s 2n

slide-34
SLIDE 34

+ OWF = “holy grail”

+LWE

+OWF [KNT18]

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s)

Compression Hierarchy

Assume sub-exponential OWF

iO poly(s) poly(s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s) Trivial 2n · s 2n

slide-35
SLIDE 35

+ OWF = “holy grail”

+LWE

+OWF [KNT18]

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s)

Compression Hierarchy

Obfustopia

iO, PKE exist

Assume sub-exponential OWF

iO poly(s) poly(s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s) Trivial 2n · s 2n

slide-36
SLIDE 36

+ OWF = “holy grail”

+LWE

+OWF [KNT18]

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s)

Compression Hierarchy

Minicrypt

No PKE

Obfustopia

iO, PKE exist

Assume sub-exponential OWF

iO poly(s) poly(s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s) Trivial 2n · s 2n

slide-37
SLIDE 37

+ OWF = “holy grail”

+LWE

+OWF [KNT18]

t(s,n)= ℓ(s,n)= XiO [LPST16] 2n(1−✏) · poly(s) poly(2n, s)

Compression Hierarchy ?

Minicrypt

No PKE

Obfustopia

iO, PKE exist

Assume sub-exponential OWF

iO poly(s) poly(s) SXiO [BNPW16] 2n(1−✏) · poly(s) 2n(1−✏) · poly(s) Trivial 2n · s 2n

slide-38
SLIDE 38

Our Results

Compressing obfuscation as an independent primitive

slide-39
SLIDE 39
  • 1. Power of compressing obfuscation

Our Results

Compressing obfuscation as an independent primitive

slide-40
SLIDE 40
  • 1. Power of compressing obfuscation

XiO + one-way functions ⇏ public-key encryption in a black-box way

Our Results

Compressing obfuscation as an independent primitive

slide-41
SLIDE 41
  • 1. Power of compressing obfuscation

XiO + one-way functions ⇏ public-key encryption in a black-box way

Our Results

Compressing obfuscation as an independent primitive

  • 2. Existence with statistical security
slide-42
SLIDE 42
  • 1. Power of compressing obfuscation

XiO + one-way functions ⇏ public-key encryption in a black-box way

Our Results

Compressing obfuscation as an independent primitive

  • 2. Existence with statistical security

Constructions for “powerful” class of circuits (e.g., AC0) Unlikely to exist with stronger compression

slide-43
SLIDE 43
  • 1. Power of compressing obfuscation

XiO + one-way functions ⇏ public-key encryption in a black-box way

Our Results

Compressing obfuscation as an independent primitive

  • 2. Existence with statistical security
  • 3. Existence under computational assumptions

Constructions for “powerful” class of circuits (e.g., AC0) Unlikely to exist with stronger compression

slide-44
SLIDE 44
  • 1. Power of compressing obfuscation

XiO + one-way functions ⇏ public-key encryption in a black-box way Approximately-correct (S)XiO + polynomial LWE + NIZK ⇒ correct (S)XiO

Our Results

Compressing obfuscation as an independent primitive

  • 2. Existence with statistical security
  • 3. Existence under computational assumptions

Constructions for “powerful” class of circuits (e.g., AC0) Unlikely to exist with stronger compression

slide-45
SLIDE 45

+ OWF = “holy grail”

Minicrypt

No PKE

+LWE

+OWF [KNT18]

t(s,n)= ℓ(s,n)=

Impact of Results

iO poly(s) poly(s)

Assume sub-exponential OWF

XiO 2n(1−✏) · poly(s) poly(2n, s) Trivial 2n · s 2n

Obfustopia

iO, PKE exist

SXiO 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

slide-46
SLIDE 46

+ OWF = “holy grail”

Minicrypt

No PKE

+LWE

+OWF [KNT18]

t(s,n)= ℓ(s,n)=

Impact of Results

iO poly(s) poly(s)

Assume sub-exponential OWF

XiO 2n(1−✏) · poly(s) poly(2n, s) +subexp OWF Trivial 2n · s 2n

Obfustopia

iO, PKE exist

SXiO 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

slide-47
SLIDE 47

+ OWF = “holy grail”

Minicrypt

No PKE

t(s,n)= ℓ(s,n)= iO poly(s) poly(s)

+LWE

+OWF [KNT18]

+subexp OWF XiO 2n(1−✏) · poly(s) poly(2n, s)

Obfustopia

iO, PKE exist

SXiO 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

Impact of Results

Assume sub-exponential OWF

Trivial 2n · s 2n

slide-48
SLIDE 48

+ OWF = “holy grail”

Minicrypt

No PKE

t(s,n)= ℓ(s,n)= iO poly(s) poly(s)

+LWE

+OWF [KNT18]

+subexp OWF XiO 2n(1−✏) · poly(s) poly(2n, s)

Obfustopia

iO, PKE exist

SXiO 2n(1−✏) · poly(s) 2n(1−✏) · poly(s)

Approximate XiO

+polynomial LWE, NIZK

Impact of Results

Assume sub-exponential OWF

Trivial 2n · s 2n

slide-49
SLIDE 49

Our Results and Outline

  • 1. Power of compressing obfuscation
  • 2. Existence with statistical security
  • 3. Existence under computational assumptions

XiO + one-way functions ⇏ public-key encryption in a black-box way Approximately-correct (S)XiO + polynomial LWE + NIZK ⇒ correct (S)XiO Constructions for “powerful” class of circuits (e.g., AC0) Unlikely to exist with stronger compression

slide-50
SLIDE 50

Power of XiO

Is XiO useful without LWE?

Recall: XiO + LWE ⇒ iO

slide-51
SLIDE 51

Power of XiO

Is XiO useful without LWE?

iO

Public Key Crypto Secret Key Crypto

Recall: XiO + LWE ⇒ iO

slide-52
SLIDE 52

Power of XiO

Is XiO useful without LWE?

iO

Public Key Crypto Secret Key Crypto

Theorem: XiO + OWF ⇏ PKE in a black-box way Recall: XiO + LWE ⇒ iO

slide-53
SLIDE 53

Enc(pk,m): Sample r and evaluate pk

  • n (m,r)

pk ← iO.Obf

secret-key encryption

( )

m r ct

[SW14]

Intuition: PKE from iO + OWF

slide-54
SLIDE 54
  • With XiO, (m,r) must be short—Adversary can learn all possible

ciphertexts!

  • We show this is inherent for any construction from XiO

Enc(pk,m): Sample r and evaluate pk

  • n (m,r)

pk ← iO.Obf

secret-key encryption

( )

m r ct

[SW14]

Intuition: PKE from iO + OWF

slide-55
SLIDE 55
  • With XiO, (m,r) must be short—Adversary can learn all possible

ciphertexts!

  • We show this is inherent for any construction from XiO

Enc(pk,m): Sample r and evaluate pk

  • n (m,r)

pk ← iO.Obf(

)

m r ct

[SW14]

Intuition: PKE from iO + OWF

f

slide-56
SLIDE 56
  • With XiO, (m,r) must be short—Adversary can learn all possible

ciphertexts!

  • We show this is inherent for any construction from XiO

Enc(pk,m): Sample r and evaluate pk

  • n (m,r)

pk ← iO.Obf(

)

m r ct

[SW14]

Intuition: PKE from iO + OWF

OWF OWF

slide-57
SLIDE 57

Black-Box Model

We consider XiO for oracle-aided circuits

slide-58
SLIDE 58

Black-Box Model

We consider XiO for oracle-aided circuits

  • First used for circuits with OWF gates [BKSY11, AS16]
slide-59
SLIDE 59

Black-Box Model

We consider XiO for oracle-aided circuits

  • First used for circuits with OWF gates [BKSY11, AS16]

Problem: Separation overcome by new constructions (e.g., PKE from SXiO + OWFs [BNPW16])

slide-60
SLIDE 60

Black-Box Model

We consider XiO for oracle-aided circuits

  • First used for circuits with OWF gates [BKSY11, AS16]

Problem: Separation overcome by new constructions (e.g., PKE from SXiO + OWFs [BNPW16])

  • Extended to circuits with iO and OWF gates [GMM17]
slide-61
SLIDE 61

Black-Box Model

We consider XiO for oracle-aided circuits

  • First used for circuits with OWF gates [BKSY11, AS16]

Captures known techniques for iO, e.g., “self-feeding” techniques

xiO

OWF

Our result — extended model

Problem: Separation overcome by new constructions (e.g., PKE from SXiO + OWFs [BNPW16])

  • Extended to circuits with iO and OWF gates [GMM17]
slide-62
SLIDE 62

Black-Box Model

We consider XiO for oracle-aided circuits

  • First used for circuits with OWF gates [BKSY11, AS16]

Captures known techniques for iO, e.g., “self-feeding” techniques

xiO

OWF

Our result — extended model

Problem: Separation overcome by new constructions (e.g., PKE from SXiO + OWFs [BNPW16])

  • Extended to circuits with iO and OWF gates [GMM17]

Non-black-box extension of Impagliazzo-Rudich separation [IR89]

slide-63
SLIDE 63
  • 1. Power of compressing obfuscation
  • 2. Existence with statistical security
  • 3. Existence under computational assumptions

XiO + one-way functions ⇏ public-key encryption in a black-box way Approximately-correct (S)XiO + polynomial LWE + NIZK ⇒ correct (S)XiO Constructions for “powerful” class of circuits (e.g., AC0) Unlikely to exist with stronger compression

Our Results and Outline

slide-64
SLIDE 64

Statistically Secure Compressing Obfuscation

Main idea: Take advantage of the running time of XiO

slide-65
SLIDE 65

Statistically Secure Compressing Obfuscation

Theorem: XiO with output 2n(1−o(1)) length exists for AC0

Main idea: Take advantage of the running time of XiO

slide-66
SLIDE 66

Statistically Secure Compressing Obfuscation

Circuit compression [CKK+15]:

f

f(1) f(2) …

C

Theorem: XiO with output 2n(1−o(1)) length exists for AC0

Main idea: Take advantage of the running time of XiO

slide-67
SLIDE 67

Statistically Secure Compressing Obfuscation

Circuit compression [CKK+15]:

f

f(1) f(2) …

C

Theorem: XiO with output 2n(1−o(1)) length exists for AC0

Construction is black-box, i.e., implies compressing VBB

Main idea: Take advantage of the running time of XiO

slide-68
SLIDE 68

Statistically Secure Compressing Obfuscation

Circuit compression [CKK+15]:

f

f(1) f(2) …

C

Theorem: XiO with output 2n(1−o(1)) length exists for AC0

Stronger compression implies nontrivial speedups for UNSAT

Construction is black-box, i.e., implies compressing VBB

Main idea: Take advantage of the running time of XiO

slide-69
SLIDE 69

Statistically Secure Compressing Obfuscation

Circuit compression [CKK+15]:

f

f(1) f(2) …

C

Theorem: XiO with output 2n(1−o(1)) length exists for AC0

Stronger compression implies nontrivial speedups for UNSAT

Construction is black-box, i.e., implies compressing VBB

Main idea: Take advantage of the running time of XiO

Theorem:

  • compressing obfuscation

circuits implies UNSAT ∈ AM[2c✏n] for depth 2 (2✏n, 2✏n) for a constant c

slide-70
SLIDE 70

Statistically Secure Compressing Obfuscation

Circuit compression [CKK+15]:

f

f(1) f(2) …

C

Theorem: XiO with output 2n(1−o(1)) length exists for AC0

Stronger compression implies nontrivial speedups for UNSAT

Construction is black-box, i.e., implies compressing VBB

Main idea: Take advantage of the running time of XiO

Theorem:

  • compressing obfuscation

circuits implies UNSAT ∈ AM[2c✏n] for depth 2 (2✏n, 2✏n) for a constant c

slide-71
SLIDE 71

Statistically Secure Compressing Obfuscation

  • Conclusion is true when ϵ = 1/2 [W16]
  • Unknown for smaller ϵ

Circuit compression [CKK+15]:

f

f(1) f(2) …

C

Theorem: XiO with output 2n(1−o(1)) length exists for AC0

Stronger compression implies nontrivial speedups for UNSAT

Construction is black-box, i.e., implies compressing VBB

Main idea: Take advantage of the running time of XiO

Theorem:

  • compressing obfuscation

circuits implies UNSAT ∈ AM[2c✏n] for depth 2 (2✏n, 2✏n) for a constant c

slide-72
SLIDE 72

Conclusion

Compressing obfuscation is unusual!

slide-73
SLIDE 73

Cryptomania Minicrypt

Conclusion

Compressing obfuscation is unusual!

slide-74
SLIDE 74

Cryptomania Minicrypt

Conclusion

XiO Compressing obfuscation is unusual!

slide-75
SLIDE 75

Cryptomania Minicrypt

Conclusion

XiO

Minicrypt

Compressing obfuscation is unusual!

slide-76
SLIDE 76

Cryptomania Minicrypt

Conclusion

XiO

Minicrypt

XiO Compressing obfuscation is unusual!

slide-77
SLIDE 77

Obfustopia Cryptomania Minicrypt

Conclusion

XiO

Minicrypt

XiO Compressing obfuscation is unusual!

slide-78
SLIDE 78

Obfustopia Cryptomania Minicrypt

Conclusion

XiO

Minicrypt

XiO Compressing obfuscation is unusual!

slide-79
SLIDE 79

Obfustopia Cryptomania Minicrypt

Conclusion

XiO

Minicrypt

XiO Compressing obfuscation is unusual!

slide-80
SLIDE 80

Obfustopia Cryptomania Minicrypt

Conclusion

XiO

Minicrypt

XiO Compressing obfuscation is unusual!

slide-81
SLIDE 81

XiO is weak — cannot compress running time

Conclusion

slide-82
SLIDE 82

LWE iO

+

XiO

XiO is weak — cannot compress running time

Conclusion

slide-83
SLIDE 83

LWE iO

+

XiO

XiO is weak — cannot compress running time

compresses function size

Conclusion

slide-84
SLIDE 84

LWE iO

+

XiO

XiO is weak — cannot compress running time

succinct FE [GKP+13]

compresses function size

Conclusion

slide-85
SLIDE 85

LWE iO

+

XiO

XiO is weak — cannot compress running time

succinct FE [GKP+13]

compresses running time compresses function size

Conclusion

slide-86
SLIDE 86

LWE iO

+

XiO

Thank you!

XiO is weak — cannot compress running time

succinct FE [GKP+13]

compresses running time compresses function size

Conclusion