Christopher J Peikert writes:
> Whether the attacks can be extended to work against obfuscators is obviously a
> very important question...
A new paper says that it presents "the first polynomial-time
cryptanalysis of candidate iO schemes over GGH13":
https://eprint.iacr.org/2016/147
It's not immediately obvious to me what the attack algorithm does to,
e.g., GGH13-based point obfuscation, or what its performance might be
against the 25-gigabyte point-obfuscation challenge that Apon, Huang,
Katz, and Malozemoff announced at the Crypto 2014 rump session. The
current speed record for attacks is our paper
https://eprint.iacr.org/2015/151
which broke the challenge in 19 minutes using 21 PCs.
---Dan