Indistinguishability obfuscation

  • Aayush Jain

    UCLA, Los Angeles, CA, USA; and NTT Research, Sunnyvale, CA, USA
  • Huijia Lin

    University of Washington, Seattle, WA, USA
  • Amit Sahai

    UCLA, Los Angeles, CA, USA
Indistinguishability obfuscation cover
Download Chapter PDF

This book chapter is published open access.

Abstract

At least since the initial public proposal of public-key cryptography based on computational hardness conjectures (Diffie and Hellman, 1976), cryptographers have contemplated the possibility of a “one-way compiler” that translates computer programs into “incomprehensible” but equivalent forms. And yet, the search for such a “one-way compiler” remained elusive for decades. We examine a formalization of this concept with the notion of indistinguishability obfuscation (). Roughly speaking, requires that the compiled versions of any two equivalent programs (with the same size and running time) be indistinguishable to any efficient adversary. Finally, we show how to construct in such a way that we can prove the security of our scheme based on well-studied computational hardness conjectures in cryptography.