Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map

Abstract The authors present a classical polynomial‐time attack against the branching program obfuscator of Fernando–Rasmussen–Sahai (for short FRS, Asiacrypt’17) (with one zerotest parameter), which is robust against all known classical cryptanalyses on obfuscators when instantiated with the CLT13...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiseung Kim, Changmin Lee
Format: Article
Language:English
Published: Wiley 2022-05-01
Series:IET Information Security
Online Access:https://doi.org/10.1049/ise2.12055
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832546686723948544
author Jiseung Kim
Changmin Lee
author_facet Jiseung Kim
Changmin Lee
author_sort Jiseung Kim
collection DOAJ
description Abstract The authors present a classical polynomial‐time attack against the branching program obfuscator of Fernando–Rasmussen–Sahai (for short FRS, Asiacrypt’17) (with one zerotest parameter), which is robust against all known classical cryptanalyses on obfuscators when instantiated with the CLT13 multilinear map. The first step is to recover a plaintext modulus of the CLT13 multilinear map. To achieve the goal, the Coron and Notarnicola (Asiacrypt’19) algorithm is applied. However, because of parameter issues, the algorithm cannot be used directly. In order to detour the issue, the authors convert an FRS obfuscator into a new programme containing a small message space. Through the conversion, the authors obtain two zerotest parameters and encodings of zero except for two non‐zero slots. Then, they are used to mitigate parameter constraints of the message space recovering algorithm. Then, a cryptanalysis of the FRS obfuscation based on the recovered message space is proposed. The authors show that there exist two functionally equivalent programmes such that their obfuscated programmes are computationally distinguishable. Thus, the FRS scheme does not satisfy the desired security without any additional constraints.
format Article
id doaj-art-ac60ab0199b04d5984eefa1c1b0f406d
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2022-05-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-ac60ab0199b04d5984eefa1c1b0f406d2025-02-03T06:47:34ZengWileyIET Information Security1751-87091751-87172022-05-0116320821910.1049/ise2.12055Cryptanalysis of FRS obfuscation based on the CLT13 multilinear mapJiseung Kim0Changmin Lee1School of Computational Sciences Korea Institute for Advanced Study Seoul South KoreaSchool of Computational Sciences Korea Institute for Advanced Study Seoul South KoreaAbstract The authors present a classical polynomial‐time attack against the branching program obfuscator of Fernando–Rasmussen–Sahai (for short FRS, Asiacrypt’17) (with one zerotest parameter), which is robust against all known classical cryptanalyses on obfuscators when instantiated with the CLT13 multilinear map. The first step is to recover a plaintext modulus of the CLT13 multilinear map. To achieve the goal, the Coron and Notarnicola (Asiacrypt’19) algorithm is applied. However, because of parameter issues, the algorithm cannot be used directly. In order to detour the issue, the authors convert an FRS obfuscator into a new programme containing a small message space. Through the conversion, the authors obtain two zerotest parameters and encodings of zero except for two non‐zero slots. Then, they are used to mitigate parameter constraints of the message space recovering algorithm. Then, a cryptanalysis of the FRS obfuscation based on the recovered message space is proposed. The authors show that there exist two functionally equivalent programmes such that their obfuscated programmes are computationally distinguishable. Thus, the FRS scheme does not satisfy the desired security without any additional constraints.https://doi.org/10.1049/ise2.12055
spellingShingle Jiseung Kim
Changmin Lee
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
IET Information Security
title Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
title_full Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
title_fullStr Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
title_full_unstemmed Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
title_short Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
title_sort cryptanalysis of frs obfuscation based on the clt13 multilinear map
url https://doi.org/10.1049/ise2.12055
work_keys_str_mv AT jiseungkim cryptanalysisoffrsobfuscationbasedontheclt13multilinearmap
AT changminlee cryptanalysisoffrsobfuscationbasedontheclt13multilinearmap