TY - GEN
T1 - COA-Secure Obfuscation and Applications
AU - Canetti, Ran
AU - Chakraborty, Suvradip
AU - Khurana, Dakshita
AU - Kumar, Nishant
AU - Poburinnaya, Oxana
AU - Prabhakaran, Manoj
N1 - Publisher Copyright:
© 2022, International Association for Cryptologic Research.
PY - 2022
Y1 - 2022
N2 - We put forth a new paradigm for program obfuscation, where obfuscated programs are endowed with proofs of “well formedness.” In addition to asserting existence of an underlying plaintext program with an attested structure, these proofs also prevent mauling attacks, whereby an adversary surreptitiously creates an obfuscated program based on secrets which are embedded in other obfuscated programs. We call this new guarantee Chosen Obfuscation Attacks (COA) security. We show how to enhance a large class of obfuscation mechanisms to be COA-secure, assuming subexponentially secure IO for circuits and subexponentially secure one-way functions. To demonstrate the power of the new notion, we also use it to realize: A new form of software watermarking, which provides significantly broader protection than current schemes against counterfeits that pass a keyless, public verification process.Completely CCA encryption, which is a strengthening of completely non-malleable encryption.
AB - We put forth a new paradigm for program obfuscation, where obfuscated programs are endowed with proofs of “well formedness.” In addition to asserting existence of an underlying plaintext program with an attested structure, these proofs also prevent mauling attacks, whereby an adversary surreptitiously creates an obfuscated program based on secrets which are embedded in other obfuscated programs. We call this new guarantee Chosen Obfuscation Attacks (COA) security. We show how to enhance a large class of obfuscation mechanisms to be COA-secure, assuming subexponentially secure IO for circuits and subexponentially secure one-way functions. To demonstrate the power of the new notion, we also use it to realize: A new form of software watermarking, which provides significantly broader protection than current schemes against counterfeits that pass a keyless, public verification process.Completely CCA encryption, which is a strengthening of completely non-malleable encryption.
UR - http://www.scopus.com/inward/record.url?scp=85131933688&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85131933688&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-06944-4_25
DO - 10.1007/978-3-031-06944-4_25
M3 - Conference contribution
AN - SCOPUS:85131933688
SN - 9783031069437
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 731
EP - 758
BT - Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings
A2 - Dunkelman, Orr
A2 - Dziembowski, Stefan
PB - Springer
T2 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2022
Y2 - 30 May 2022 through 3 June 2022
ER -