Obfuscating Conjunctions

11Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.

Abstract

We show how to securely obfuscate the class of conjunction functions (functions like f(x1, … , xn) = x1∧ ¬ x4∧ ¬ x6∧ ⋯ ∧ xn-2). Given any function in the class, we produce an obfuscated program which preserves the input–output functionality of the given function, but reveals nothing else. Our construction is based on multilinear maps, and can be instantiated using the recent candidates proposed by Garg, Gentry and Halevi (EUROCRYPT 2013) and by Coron et al. (CRYPTO 2013). We show that the construction is secure when the conjunction is drawn from a distribution, under mild conditions on the distribution. Security follows from multilinear entropic variants of the Diffie–Hellman assumption. We conjecture that our construction is secure for any conjunction, regardless of the distribution from which it is drawn. We offer supporting evidence for this conjecture, proving that our obfuscator is secure for any conjunction against generic adversaries.

Cite

CITATION STYLE

APA

Brakerski, Z., & Rothblum, G. N. (2017). Obfuscating Conjunctions. Journal of Cryptology, 30(1), 289–320. https://doi.org/10.1007/s00145-015-9221-5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free