Obfuscation of Hyperplane Membership Ran Canetti 1,⋆ , Guy N. Rothblum 2 ,⋆⋆ , and Mayank Varia 3,⋆⋆⋆ 1 School of Computer Science, Tel Aviv University canetti@cs.tau.ac.il 2 Princeton University rothblum@princeton.edu 3 Massachusetts Institute of Technology varia@csail.mit.edu Abstract. Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscat- ing simple functions such as equality testing (point functions). In this work, we construct an obfuscator for a more complex algebraic function- ality: testing for membership in a hyperplane (of constant dimension). We prove the security of the obfuscator under a new strong variant of the Decisional Diffie-Hellman assumption. Finally, we show a cryptographic application of the new obfuscator to digital signatures. 1 Introduction The problem of program obfuscation has been of long-standing interest to prac- titioners, and has recently been an active topic of research in theoretical cryp- tography. The high-level goal of program obfuscation is to compile a computer program in such a way that an adversary cannot learn anything from seeing the program beyond could be learned by running the program and observing its input-output behavior. Barak et al. [1] formalized the notion of obfuscation using simulation-based definitions. Over the past decade, the theory community has found a few positive obfuscation results for specific families of programs. In this paper, we provide an obfuscator for a new family of programs. Virtual black-box obfuscation. The procedure of “obfuscating” a computer program should garble the program’s code and make it unintelligible. The extent of the garbling is limited by the fact that the program’s functionality should be preserved. As a result, both honest and adversarial users of the obfuscated program can learn some information by observing the program’s input-output functionality, and we do not wish to prevent users from learning information this Supported by the Check Point Institute for Information Security, an ISF grant, an EU Marie Curie grant, and an Israel-US BSF grant. ⋆⋆ Supported by NSF Grants CCF-0635297, CCF-0832797 and by a Computing In- novation Fellowship. ⋆⋆⋆ Supported by the Department of Defense through the NDSEG Program. D. Micciancio (Ed.): TCC 2010, LNCS 5978, pp. 72–89, 2010. c International Association for Cryptologic Research 2010