Contention in Cryptoland: Obfuscation, Leakage and UCE [chapter]

Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2015 Lecture Notes in Computer Science  
This paper addresses the fundamental question of whether or not different, exciting primitives now being considered actually exist. We show that we, unfortunately, cannot have them all. We provide results of the form ¬A ∨ ¬B, meaning one of the primitives A, B cannot exist. (But we don't know which.) Specifically, we show that: (1) VGBO (Virtual Grey Box Obfuscation) for all circuits, which has been conjectured to be achieved by candidate constructions, cannot co-exist with Canetti's 1997
more » ... (auxiliary input DH inversion) assumption, which has been used to achieve many goals including point-function obfuscation (2) iO (indistinguishability obfuscation) for all circuits cannot co-exist with key-message leakage-resilient symmetric encryption (3) iO cannot co-exist with hash functions that are UCE secure for computationally unpredictable split sources.
doi:10.1007/978-3-662-49099-0_20 fatcat:3rrsxiqoqzbm7f5ale2fizmxfa