{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:10:46Z","timestamp":1759335046914,"version":"build-2065373602"},"reference-count":22,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"crossref","award":["61972457"],"award-info":[{"award-number":["61972457"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Principal's Fund of Minnan Normal University","award":["KJ2020023"],"award-info":[{"award-number":["KJ2020023"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:p> Indistinguishable Obfuscation (IO) is a very critical cryptography primitive. It can be used to construct almost any other cryptography schemes. AB15 indistinguishability obfuscation scheme is the first practical scheme. In order to avoid the ideal generator can be searched, authors of AB15 IO scheme set it to a relatively large size (In fact, such ideal generator should be a \u201csmall prime\u201d). It causes the ratio of the standard deviation of Gaussian sampling and the size of ideal generator smaller. We call the ratio as \u201cdeviation ratio\u201d. <\/jats:p><jats:p> In this paper, we point that direct sampling and smaller deviation ratio makes the scheme insecure. A searching attack can reveal hidden coefficients of original boolean circuit from its obfuscator. Firstly, the attacker searches those level-0 encodings of 0, hoping that the code value is 0. Such event happens with probability [Formula: see text] or [Formula: see text], where [Formula: see text] as the deviation ratio. By a series of searching, a weak obfuscator with prime module can be obtained. Then, the attacker can obtain all hidden coefficients of original boolean circuit. Take n as the dimension of independent variable, m as the dimension of coefficient of original boolean circuit. For Simple Obfuscator, searching time is [Formula: see text], and the probability that one successfully reveals hidden coefficients of original boolean circuit is about [Formula: see text]. For Robust Obfuscator, searching time and success probability are respectively [Formula: see text] and [Formula: see text]. At last, we present a revised scheme with \u201cconditionally accepted sampling\u201d and smaller deviation ratio. The new scheme avoids above mentioned attack and greatly reduce the size complexity. <\/jats:p>","DOI":"10.1142\/s0129054124500217","type":"journal-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T04:15:05Z","timestamp":1735618505000},"page":"867-883","source":"Crossref","is-referenced-by-count":0,"title":["Conditionally accepted sampling: AB15 IO scheme with smaller deviation ratio"],"prefix":"10.1142","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2469-1307","authenticated-orcid":false,"given":"Jiangshan","family":"Chen","sequence":"first","affiliation":[{"name":"Fujian Key Laboratory of Granular Computing and Applications, Minnan Normal University, Zhangzhou Fujian 363000, P.\u00a0R.\u00a0China"},{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1977-0959","authenticated-orcid":false,"given":"Yupu","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9756-5742","authenticated-orcid":false,"given":"Siyue","family":"Dong","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2024,12,31]]},"reference":[{"key":"S0129054124500217BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_2"},{"key":"S0129054124500217BIB003","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060669"},{"key":"S0129054124500217BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_11"},{"key":"S0129054124500217BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_28"},{"key":"S0129054124500217BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_23"},{"key":"S0129054124500217BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_5"},{"key":"S0129054124500217BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_11"},{"key":"S0129054124500217BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_6"},{"key":"S0129054124500217BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_28"},{"key":"S0129054124500217BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"S0129054124500217BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"S0129054124500217BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_21"},{"key":"S0129054124500217BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"S0129054124500217BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_24"},{"key":"S0129054124500217BIB016","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"S0129054124500217BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_2"},{"key":"S0129054124500217BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.11"},{"key":"S0129054124500217BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_10"},{"key":"S0129054124500217BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_6"},{"key":"S0129054124500217BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56617-7_9"},{"key":"S0129054124500217BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_26"},{"key":"S0129054124500217BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_7"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054124500217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T03:35:25Z","timestamp":1759289725000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0129054124500217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,31]]},"references-count":22,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["10.1142\/S0129054124500217"],"URL":"https:\/\/doi.org\/10.1142\/s0129054124500217","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"type":"print","value":"0129-0541"},{"type":"electronic","value":"1793-6373"}],"subject":[],"published":{"date-parts":[[2024,12,31]]}}}