Expedition to Obfustopia: Indistinguishability Obfuscation from Well-Studied Assumptions to New...

Published on ● Video Link: https://www.youtube.com/watch?v=2PRUSkA86h4



Duration: 0:00
189 views
7


Rachel Lin (University of Washington)
https://simons.berkeley.edu/talks/rachel-lin-university-washington-2025-06-23
Obfuscation

At least since the initial public proposal of public-key cryptography based on computational hardness assumptions (Diffie and Hellman, 1976), cryptographers have contemplated the possibility of a “one-way compiler” that translates computer programs into “unintelligible” ones that compute the same function. This vision has been formalized in the notion of indistinguishability obfuscation (iO), which over the past decade has emerged as a powerful and versatile tool for enabling a wide range of goals both within and beyond cryptography. In this talk, we will outline milestones in the conceptual and technical development of iO, and the tortuous decade-long journey toward its realization. We will convey the high-level ideas behind the recent constructions based on three well-studied hardness assumptions, as well as explore the emerging frontier: latest efforts to realize iO from simple-to-state assumptions over integer lattices. These advances form a robust foundation for obfuscation and raise intriguing open questions for future work. Together, they chart our ongoing expedition toward Obfustopia - a long-envisioned land where general-purpose obfuscation becomes both theoretically sound and practically attainable.




Other Videos By Simons Institute for the Theory of Computing


2025-06-26Expedition to Obfustopia: Indistinguishability Obfuscation from Well-Studied Assumptions to New...
2025-06-25To interact or not to interact: Cryptographic proof systems and the Fiat-Shamir heuristic
2025-06-18Succinct arguments for QMA from standard assumptions, without quantum PCPs
2025-05-30Crypto + Meta-complexity 2
2025-05-30Crypto + Meta-complexity 1
2025-05-30Crypto + ML 2
2025-05-30Crypto + ML 1
2025-05-30Private Information Retrieval and Oblivious RAM
2025-05-30Secure Computation 3
2025-05-30Secure Computation 2
2025-05-30Secure Computation 1
2025-05-30Proofs - Practice 2
2025-05-30Proofs - Practice 1
2025-05-30Proofs - Theory
2025-05-30Quantum 4
2025-05-30Quantum 3
2025-05-30Quantum 2
2025-05-30Foundations 2
2025-05-18Foundations 1
2025-05-01Future Directions In AI Safety Research
2025-04-27Introduction (Sanjit Seshia)