On the (im) possibility of obfuscating programs

B Barak, O Goldreich, R Impagliazzo, S Rudich… - Annual international …, 2001 - Springer
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a
program (or circuit) P and produces a new program O (P) that has the same functionality as …

Indistinguishability obfuscation from functional encryption

N Bitansky, V Vaikuntanathan - Journal of the ACM (JACM), 2018 - dl.acm.org
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …

On the (im) possibility of obfuscating programs

B Barak, O Goldreich, R Impagliazzo, S Rudich… - Journal of the ACM …, 2012 - dl.acm.org
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a
program (or circuit) P and produces a new program O (P) that has the same functionality as …

[PDF][PDF] On the impossibility of cryptography alone for {Privacy-Preserving} cloud computing

M Van Dijk, A Juels - 5th USENIX Workshop on Hot Topics in Security …, 2010 - usenix.org
Cloud computing denotes an architectural shift toward thin clients and conveniently
centralized provision of computing resources. Clients' lack of direct resource control in the …

On best-possible obfuscation

S Goldwasser, GN Rothblum - Theory of Cryptography: 4th Theory of …, 2007 - Springer
An obfuscator is a compiler that transforms any program (which we will view in this work as a
boolean circuit) into an obfuscated program (also a circuit) that has the same input-output …

On cryptography with auxiliary input

Y Dodis, YT Kalai, S Lovett - Proceedings of the forty-first annual ACM …, 2009 - dl.acm.org
We study the question of designing cryptographic schemes which are secure even if an
arbitrary function f (sk) of the secret key is leaked, as long as the secret key sk is still …

Obfuscating point functions with multibit output

R Canetti, RR Dakdouk - … in Cryptology–EUROCRYPT 2008: 27th Annual …, 2008 - Springer
We construct obfuscators of point functions with multibit output and other related functions. A
point function with multibit output returns a fixed string on a single input point and zero …

Quantum copy-protection of compute-and-compare programs in the quantum random oracle model

A Coladangelo, C Majenz, A Poremba - Quantum, 2024 - quantum-journal.org
Copy-protection allows a software distributor to encode a program in such a way that it can
be evaluated on any input, yet it cannot be" pirated"–a notion that is impossible to achieve in …

On strong simulation and composable point obfuscation

N Bitansky, R Canetti - Journal of cryptology, 2014 - Springer
Abstract The Virtual Black Box (VBB) property for program obfuscators provides a strong
guarantee: anything computable by an efficient adversary, given the obfuscated program …

Obfuscation of hyperplane membership

R Canetti, GN Rothblum, M Varia - Theory of Cryptography: 7th Theory of …, 2010 - Springer
Previous work on program obfuscation gives strong negative results for general-purpose
obfuscators, and positive results for obfuscating simple functions such as equality testing …