首页> 外文会议>Annual international cryptology conference >Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
【24h】

Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map

机译:统计归零攻击:对GGH15多元线性图上的BP模糊化候选进行密码分析

获取原文

摘要

We present a new cryptanalytic algorithm on obfuscations based on GGH15 multilinear map. Our algorithm, statistical zeroizing attack, directly distinguishes two distributions from obfuscation while it follows the zeroizing attack paradigm, that is, it uses evaluations of zeros of obfuscated programs. Our attack breaks the recent indistinguishability obfuscation candidate suggested by Chen et al (CRYPTO'18) for the optimal parameter settings. More precisely, we show that there are two functionally equivalent branching programs whose CVW obfuscations can be efficiently distinguished by computing the sample variance of evaluations. This statistical attack gives a new perspective on the security of the indistinguishability obfuscations: we should consider the shape of the distributions of evaluation of obfuscation to ensure security. In other words, while most of the previous (weak) security proofs have been studied with respect to algebraic attack model or ideal model, our attack shows that this algebraic security is not enough to achieve indistinguishability obfuscation. In particular, we show that the obfuscation scheme suggested by Bartusek et al. (TCC'18) does not achieve the desired security in a certain parameter regime, in which their algebraic security proof still holds. The correctness of statistical zeroizing attacks holds under a mild assumption on the preimage sampling algorithm with a lattice trapdoor. We experimentally verify this assumption for implemented obfuscation by Halevi et al. (ACM CCS'17).
机译:我们提出了一种基于GGH15多线性图的模糊处理新密码分析算法。我们的算法为统计归零攻击,它遵循归零攻击范式,直接从混淆中区分出两种分布,即,它使用对混淆程序的零进行评估。我们的攻击打破了Chen等人(CRYPTO'18)为获得最佳参数设置而建议的最近不可区分的混淆方法。更确切地说,我们表明存在两个功能上等效的分支程序,这些分支程序的CVW模糊处理可以通过计算评估的样本方差来有效地区分。这种统计攻击为不可区分混淆的安全性提供了新的视角:我们应该考虑混淆评估的分布形状,以确保安全性。换句话说,尽管已经针对代数攻击模型或理想模型研究了大多数先前的(弱)安全性证明,但我们的攻击表明,这种代数安全性不足以实现不可区分性。特别是,我们证明了Bartusek等人提出的混淆方案。 (TCC'18)在某些参数范围内仍未达到所需的安全性,在该参数范围内其代数安全性证明仍然成立。统计归零攻击的正确性在使用带格活板门的原像采样算法的温和假设下得以维持。我们通过实验验证了由Halevi等人进行的混淆处理的假设。 (ACM CCS'17)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号