Synergy Between Circuit Obfuscation and Circuit Minimization

Authors Russell Impagliazzo , Valentine Kabanets, Ilya Volkovich



PDF
Thumbnail PDF

File

LIPIcs.APPROX-RANDOM.2023.31.pdf
  • Filesize: 0.92 MB
  • 21 pages

Document Identifiers

Author Details

Russell Impagliazzo
  • Department of Computer Science, University of California San Diego, La Jolla, CA, USA
Valentine Kabanets
  • School of Computing Science, Simon Fraser University, Burnaby, Canada
Ilya Volkovich
  • Computer Science Department, Boston College, Chestnut Hill, MA, USA

Acknowledgements

The authors would like to thank the anonymous referees for their detailed comments and suggestions on the previous version of the paper.

Cite As Get BibTex

Russell Impagliazzo, Valentine Kabanets, and Ilya Volkovich. Synergy Between Circuit Obfuscation and Circuit Minimization. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 275, pp. 31:1-31:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023) https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2023.31

Abstract

We study close connections between Indistinguishability Obfuscation (IO) and the Minimum Circuit Size Problem (MCSP), and argue that efficient algorithms/construction for MCSP and IO create a synergy. Some of our main results are:  
- If there exists a perfect (imperfect) IO that is computationally secure against nonuniform polynomial-size circuits, then for all k ∈ ℕ: NP ∩ ZPP^{MCSP} ⊈ SIZE[n^k] (MA ∩ ZPP^{MCSP} ⊈ SIZE[n^k]). 
- In addition, if there exists a perfect IO that is computationally secure against nonuniform polynomial-size circuits, then NEXP ∩ ZPEXP^{MCSP} ⊈ P/poly.
- If MCSP ∈ BPP, then statistical security and computational security for IO are equivalent.
- If computationally-secure perfect IO exists, then MCSP ∈ BPP iff NP = ZPP.
- If computationally-secure perfect IO exists, then ZPEXP ≠ BPP.
To the best of our knowledge, this is the first consequence of strong circuit lower bounds from the existence of an IO. The results are obtained via a construction of an optimal universal distinguisher, computable in randomized polynomial time with access to the MCSP oracle, that will distinguish any two circuit-samplable distributions with the advantage that is the statistical distance between these two distributions minus some negligible error term. This is our main technical contribution. As another immediate application, we get a simple proof of the result by Allender and Das (Inf. Comput., 2017) that SZK ⊆ BPP^{MCSP}.

Subject Classification

ACM Subject Classification
  • Theory of computation → Cryptographic primitives
  • Theory of computation → Complexity classes
  • Theory of computation → Circuit complexity
Keywords
  • Minimal Circuit Size Problem (MCSP)
  • Circuit Lower Bounds
  • Complexity Classes
  • Indistinguishability Obfuscation
  • Separation of Classes
  • Statistical Distance

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Leonard M. Adleman. Two theorems on random polynomial time. In 19th Annual Symposium on Foundations of Computer Science, Ann Arbor, Michigan, USA, 16-18 October 1978, pages 75-83. IEEE Computer Society, 1978. URL: https://doi.org/10.1109/SFCS.1978.37.
  2. William Aiello and Johan Håstad. Statistical zero-knowledge languages can be recognized in two rounds. J. Comput. Syst. Sci., 42(3):327-345, 1991. URL: https://doi.org/10.1016/0022-0000(91)90006-Q.
  3. Eric Allender, Harry Buhrman, Michal Koucký, Dieter van Melkebeek, and Detlef Ronneburger. Power from random strings. SIAM J. Comput., 35(6):1467-1493, 2006. URL: https://doi.org/10.1137/050628994.
  4. Eric Allender, Mahdi Cheraghchi, Dimitrios Myrisiotis, Harsha Tirumala, and Ilya Volkovich. One-way functions and a conditional variant of MKTP. In Mikolaj Bojanczyk and Chandra Chekuri, editors, 41st IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2021, December 15-17, 2021, Virtual Conference, volume 213 of LIPIcs, pages 7:1-7:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2021. URL: https://doi.org/10.4230/LIPIcs.FSTTCS.2021.7.
  5. Eric Allender and Bireswar Das. Zero knowledge and circuit minimization. Inf. Comput., 256:2-8, 2017. URL: https://doi.org/10.1016/j.ic.2017.04.004.
  6. Vikraman Arvind, Johannes Köbler, Uwe Schöning, and Rainer Schuler. If NP has polynomial-size circuits, then MA=AM. Theor. Comput. Sci., 137(2):279-282, 1995. URL: https://doi.org/10.1016/0304-3975(95)91133-B.
  7. Boaz Barak. A probabilistic-time hierarchy theorem for "slightly non-uniform" algorithms. In José D. P. Rolim and Salil P. Vadhan, editors, Randomization and Approximation Techniques, 6th International Workshop, RANDOM 2002, Cambridge, MA, USA, September 13-15, 2002, Proceedings, volume 2483 of Lecture Notes in Computer Science, pages 194-208. Springer, 2002. URL: https://doi.org/10.1007/3-540-45726-7_16.
  8. Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. J. ACM, 59(2):6:1-6:48, 2012. URL: https://doi.org/10.1145/2160158.2160159.
  9. Andrej Bogdanov and Luca Trevisan. Average-case complexity. Found. Trends Theor. Comput. Sci., 2(1), 2006. URL: https://doi.org/10.1561/0400000004.
  10. Dan Boneh and Mark Zhandry. Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Algorithmica, 79(4):1233-1285, 2017. URL: https://doi.org/10.1007/s00453-016-0242-8.
  11. Ravi B. Boppana, Johan Håstad, and Stathis Zachos. Does co-np have short interactive proofs? Inf. Process. Lett., 25(2):127-132, 1987. URL: https://doi.org/10.1016/0020-0190(87)90232-8.
  12. Zvika Brakerski, Christina Brzuska, and Nils Fleischhacker. On statistically secure obfuscation with approximate correctness. In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, volume 9815 of Lecture Notes in Computer Science, pages 551-578. Springer, 2016. URL: https://doi.org/10.1007/978-3-662-53008-5_19.
  13. Nader H. Bshouty, Richard Cleve, Ricard Gavaldà, Sampath Kannan, and Christino Tamon. Oracles and queries that are sufficient for exact learning. J. Comput. Syst. Sci., 52(3):421-433, 1996. URL: https://doi.org/10.1006/jcss.1996.0032.
  14. Harry Buhrman, Lance Fortnow, and Aduri Pavan. Some results on derandomization. Theory Comput. Syst., 38(2):211-227, 2005. URL: https://doi.org/10.1007/s00224-004-1194-y.
  15. Harry Buhrman and Leen Torenvliet. Randomness is hard. SIAM J. Comput., 30(5):1485-1501, 2000. URL: https://doi.org/10.1137/S0097539799360148.
  16. Thomas Eiter and Georg Gottlob. Identifying the minimal transversals of a hypergraph and related problems. SIAM J. Comput., 24(6):1278-1304, 1995. URL: https://doi.org/10.1137/S0097539793250299.
  17. Lance Fortnow. The complexity of perfect zero-knowledge. Adv. Comput. Res., 5:327-343, 1989. Google Scholar
  18. Lance Fortnow and Rahul Santhanam. Hierarchy theorems for probabilistic polynomial time. In 45th Symposium on Foundations of Computer Science (FOCS 2004), 17-19 October 2004, Rome, Italy, Proceedings, pages 316-324. IEEE Computer Society, 2004. URL: https://doi.org/10.1109/FOCS.2004.33.
  19. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM J. Comput., 45(3):882-929, 2016. URL: https://doi.org/10.1137/14095772X.
  20. Sanjam Garg and Antigoni Polychroniadou. Two-round adaptively secure MPC from indistinguishability obfuscation. In Yevgeniy Dodis and Jesper Buus Nielsen, editors, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II, volume 9015 of Lecture Notes in Computer Science, pages 614-637. Springer, 2015. URL: https://doi.org/10.1007/978-3-662-46497-7_24.
  21. Craig Gentry, Allison Bishop Lewko, Amit Sahai, and Brent Waters. Indistinguishability obfuscation from the multilinear subgroup elimination assumption. In Venkatesan Guruswami, editor, IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015, pages 151-170. IEEE Computer Society, 2015. URL: https://doi.org/10.1109/FOCS.2015.19.
  22. Oded Goldreich. A note on computational indistinguishability. Inf. Process. Lett., 34(6):277-281, 1990. URL: https://doi.org/10.1016/0020-0190(90)90010-U.
  23. Shafi Goldwasser and Guy N. Rothblum. On best-possible obfuscation. J. Cryptol., 27(3):480-505, 2014. URL: https://doi.org/10.1007/s00145-013-9151-z.
  24. Shuichi Hirahara. Capturing one-way functions via np-hardness of meta-complexity. In Barna Saha and Rocco A. Servedio, editors, Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, Orlando, FL, USA, June 20-23, 2023, pages 1027-1038. ACM, 2023. URL: https://doi.org/10.1145/3564246.3585130.
  25. Rahul Ilango, Hanlin Ren, and Rahul Santhanam. Hardness on any samplable distribution suffices: New characterizations of one-way functions by meta-complexity. Electron. Colloquium Comput. Complex., TR21-082, 2021. URL: https://arxiv.org/abs/TR21-082.
  26. Russell Impagliazzo. A personal view of average-case complexity. In Proceedings of the Tenth Annual Structure in Complexity Theory Conference, Minneapolis, Minnesota, USA, June 19-22, 1995, pages 134-147. IEEE Computer Society, 1995. URL: https://doi.org/10.1109/SCT.1995.514853.
  27. Russell Impagliazzo, Valentine Kabanets, and Ilya Volkovich. The power of natural properties as oracles. In Rocco A. Servedio, editor, 33rd Computational Complexity Conference, CCC 2018, June 22-24, 2018, San Diego, CA, USA, volume 102 of LIPIcs, pages 7:1-7:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018. URL: https://doi.org/10.4230/LIPIcs.CCC.2018.7.
  28. Russell Impagliazzo and Michael Luby. One-way functions are essential for complexity based cryptography (extended abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989, pages 230-235. IEEE Computer Society, 1989. URL: https://doi.org/10.1109/SFCS.1989.63483.
  29. Aayush Jain, Huijia Lin, and Amit Sahai. Indistinguishability obfuscation from well-founded assumptions. In Samir Khuller and Virginia Vassilevska Williams, editors, STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021, pages 60-73. ACM, 2021. URL: https://doi.org/10.1145/3406325.3451093.
  30. Mark Jerrum, Leslie G. Valiant, and Vijay V. Vazirani. Random generation of combinatorial structures from a uniform distribution. Theor. Comput. Sci., 43:169-188, 1986. URL: https://doi.org/10.1016/0304-3975(86)90174-X.
  31. Valentine Kabanets and Jin-yi Cai. Circuit minimization problem. In F. Frances Yao and Eugene M. Luks, editors, Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, USA, pages 73-79. ACM, 2000. URL: https://doi.org/10.1145/335305.335314.
  32. Ravi Kannan. Circuit-size lower bounds and non-reducibility to sparse sets. Inf. Control., 55(1-3):40-56, 1982. URL: https://doi.org/10.1016/S0019-9958(82)90382-5.
  33. Johannes Köbler and Osamu Watanabe. New collapse consequences of NP having small circuits. SIAM J. Comput., 28(1):311-324, 1998. URL: https://doi.org/10.1137/S0097539795296206.
  34. Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, and Eylon Yogev. One-way functions and (im)perfect obfuscation. In 55th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2014, Philadelphia, PA, USA, October 18-21, 2014, pages 374-383. IEEE Computer Society, 2014. URL: https://doi.org/10.1109/FOCS.2014.47.
  35. Ilan Komargodski, Moni Naor, and Eylon Yogev. Secret-sharing for NP. J. Cryptol., 30(2):444-469, 2017. URL: https://doi.org/10.1007/s00145-015-9226-0.
  36. Huijia Lin. Indistinguishability obfuscation from constant-degree graded encoding schemes. In Marc Fischlin and Jean-Sébastien Coron, editors, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, volume 9665 of Lecture Notes in Computer Science, pages 28-57. Springer, 2016. URL: https://doi.org/10.1007/978-3-662-49890-3_2.
  37. Yanyi Liu and Rafael Pass. On one-way functions and kolmogorov complexity. In Sandy Irani, editor, 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS 2020, Durham, NC, USA, November 16-19, 2020, pages 1243-1254. IEEE, 2020. URL: https://doi.org/10.1109/FOCS46700.2020.00118.
  38. Cody D. Murray and R. Ryan Williams. Circuit lower bounds for nondeterministic quasi-polytime from a new easy witness lemma. SIAM J. Comput., 49(5), 2020. URL: https://doi.org/10.1137/18M1195887.
  39. Moni Naor and Guy N. Rothblum. Learning to impersonate. In William W. Cohen and Andrew W. Moore, editors, Machine Learning, Proceedings of the Twenty-Third International Conference (ICML 2006), Pittsburgh, Pennsylvania, USA, June 25-29, 2006, volume 148 of ACM International Conference Proceeding Series, pages 649-656. ACM, 2006. URL: https://doi.org/10.1145/1143844.1143926.
  40. Rafael Pass, Karn Seth, and Sidharth Telang. Indistinguishability obfuscation from semantically-secure multilinear encodings. In Juan A. Garay and Rosario Gennaro, editors, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, volume 8616 of Lecture Notes in Computer Science, pages 500-517. Springer, 2014. URL: https://doi.org/10.1007/978-3-662-44371-2_28.
  41. Alexander A. Razborov and Steven Rudich. Natural proofs. J. Comput. Syst. Sci., 55(1):24-35, 1997. URL: https://doi.org/10.1006/jcss.1997.1494.
  42. Amit Sahai and Salil P. Vadhan. A complete problem for statistical zero knowledge. J. ACM, 50(2):196-249, 2003. URL: https://doi.org/10.1145/636865.636868.
  43. Amit Sahai and Brent Waters. How to use indistinguishability obfuscation: Deniable encryption, and more. SIAM J. Comput., 50(3):857-908, 2021. URL: https://doi.org/10.1137/15M1030108.
  44. Rahul Santhanam. Circuit lower bounds for merlin-arthur classes. SIAM J. Comput., 39(3):1038-1061, 2009. URL: https://doi.org/10.1137/070702680.
  45. Boris A. Trakhtenbrot. A survey of russian approaches to perebor (brute-force searches) algorithms. IEEE Ann. Hist. Comput., 6(4):384-400, 1984. URL: https://doi.org/10.1109/MAHC.1984.10036.
  46. Dieter van Melkebeek and Konstantin Pervyshev. A generic time hierarchy with one bit of advice. Comput. Complex., 16(2):139-179, 2007. URL: https://doi.org/10.1007/s00037-007-0227-8.
  47. Ilya Volkovich. On learning, lower bounds and (un)keeping promises. In Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, and Elias Koutsoupias, editors, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I, volume 8572 of Lecture Notes in Computer Science, pages 1027-1038. Springer, 2014. URL: https://doi.org/10.1007/978-3-662-43948-7_85.
  48. Ilya Volkovich. The final nail in the coffin of statistically-secure obfuscator. Information Processing Letters, 182:106366, 2023. URL: https://doi.org/10.1016/j.ipl.2023.106366.
  49. Ryan Williams. Towards NEXP versus bpp? In Andrei A. Bulatov and Arseny M. Shur, editors, Computer Science - Theory and Applications - 8th International Computer Science Symposium in Russia, CSR 2013, Ekaterinburg, Russia, June 25-29, 2013. Proceedings, volume 7913 of Lecture Notes in Computer Science, pages 174-182. Springer, 2013. URL: https://doi.org/10.1007/978-3-642-38536-0_15.
  50. Ryan Williams. Nonuniform ACC circuit lower bounds. J. ACM, 61(1):2:1-2:32, 2014. URL: https://doi.org/10.1145/2559903.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail