In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was impossible to determine anything about it except its input and output behavior.[1] Black-box obfuscation has been proven to be impossible, even in principle.[2]
Barak et al. constructed a family of unobfuscatable programs, for which an efficient attacker can always learn more from any obfuscated code than from black-box access.[3]
Broadly, they start by engineering a special pair of programs that cannot be obfuscated together. For some randomly selected strings
\alpha,\beta
k
C\alpha,(x):=\begin{cases} \beta&ifx=\alpha\\ 0&otherwise \end{cases}
and the other program to one that computes
D\alpha,(X):=\begin{cases} 1&ifX(\alpha)=\betaandXrunsintime\leqpoly(k)\\ 0&otherwise \end{cases}.
(Here,
D\alpha,
D\alpha,
If an efficient attacker only has black-box access, Barak et al. argued, then the attacker only has an exponentially small chance of guessing the password
\alpha
C\alpha,
Z
C'\alpha,,D'\alpha,
C\alpha,,D\alpha,
D'\alpha,(C'\alpha,)=1
D'\alpha,(Z)=0
\beta=0
(C'\alpha,,D'\alpha,)
(Z,D'\alpha,)
To conclude the argument, Barak et al. define a third program to implement the functionality of the two previous:
F\alpha,(b,x):=\begin{cases} C\alpha,(x)&ifb=0\\ D\alpha,(x)&ifb=1\\ \end{cases}.
Since equivalently efficient implementations of
C\alpha,,D\alpha,
F\alpha,
b
F\alpha,
In their paper, Barak et al. also prove the following (conditional to appropriate cryptographic assumptions):
In their original paper exploring black-box obfuscation, Barak et al. defined two weaker notions of cryptographic obfuscation which they did not rule out: indistinguishability obfuscation and extractability obfuscation (which they called "differing-inputs obfuscation".) Informally, an indistinguishability obfuscator should convert input programs with the same functionality into output programs such that the outputs cannot be efficiently related to the inputs by a bounded attacker, and an extractability obfuscator should be an obfuscator such that if the efficient attacker could relate the outputs to the inputs for any two programs, then the attacker could also produce an input such that the two programs being obfuscated produce different outputs. (Note that an extractability obfuscator is necessarily an indistinguishability obfuscator.) [4]
, a candidate implementation of indistinguishability obfuscation is under investigation.[5] In 2013, Boyle et al. explored several candidate implementations of extractability obfuscation.