Indistinguishability obfuscation
Aayush Jain
UCLA, Los Angeles, CA, USA; and NTT Research, Sunnyvale, CA, USAHuijia Lin
University of Washington, Seattle, WA, USAAmit Sahai
UCLA, Los Angeles, CA, USA
This book chapter is published open access.
Abstract
At least since the initial public proposal of public-key cryptography based on computational hardness conjectures (Diffie and Hellman, 1976), cryptographers have contemplated the possibility of a “one-way compiler” that translates computer programs into “incomprehensible” but equivalent forms. And yet, the search for such a “one-way compiler” remained elusive for decades. We examine a formalization of this concept with the notion of indistinguishability obfuscation (). Roughly speaking, requires that the compiled versions of any two equivalent programs (with the same size and running time) be indistinguishable to any efficient adversary. Finally, we show how to construct in such a way that we can prove the security of our scheme based on well-studied computational hardness conjectures in cryptography.