Program Obfuscation with Leaky Hardware
We consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if a...
Main Authors: | Bitansky, Nir (Author), Canetti, Ran (Author), Goldwasser, Shafi (Contributor), Halevi, Shai (Author), Kalai, Yael Tauman (Author), Rothblum, Guy N. (Author) |
---|---|
Other Authors: | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor) |
Format: | Article |
Language: | English |
Published: |
Springer-Verlag Berlin Heidelberg,
2014-05-09T16:54:23Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
by: Bitansky, Nir, et al.
Published: (2021) -
On Best-Possible Obfuscation
by: Goldwasser, Shafi, et al.
Published: (2014) -
Attacks on the Fiat-Shamir paradigm and program obfuscation
by: Tauman Kalai, Yael
Published: (2006) -
On Best-Possible Obfuscation
by: Goldwasser, Shafrira, et al.
Published: (2021) -
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
by: Bitansky, Nir, et al.
Published: (2021)