On the (im) possibility of obfuscating programs
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a
program (or circuit) P and produces a new program O (P) that has the same functionality as …
program (or circuit) P and produces a new program O (P) that has the same functionality as …
Indistinguishability obfuscation from functional encryption
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …
almost any known cryptographic object. Prior candidate IO constructions were based on …
On the (im) possibility of obfuscating programs
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a
program (or circuit) P and produces a new program O (P) that has the same functionality as …
program (or circuit) P and produces a new program O (P) that has the same functionality as …
[PDF][PDF] On the impossibility of cryptography alone for {Privacy-Preserving} cloud computing
M Van Dijk, A Juels - 5th USENIX Workshop on Hot Topics in Security …, 2010 - usenix.org
Cloud computing denotes an architectural shift toward thin clients and conveniently
centralized provision of computing resources. Clients' lack of direct resource control in the …
centralized provision of computing resources. Clients' lack of direct resource control in the …
On best-possible obfuscation
An obfuscator is a compiler that transforms any program (which we will view in this work as a
boolean circuit) into an obfuscated program (also a circuit) that has the same input-output …
boolean circuit) into an obfuscated program (also a circuit) that has the same input-output …
On cryptography with auxiliary input
We study the question of designing cryptographic schemes which are secure even if an
arbitrary function f (sk) of the secret key is leaked, as long as the secret key sk is still …
arbitrary function f (sk) of the secret key is leaked, as long as the secret key sk is still …
Obfuscating point functions with multibit output
R Canetti, RR Dakdouk - … in Cryptology–EUROCRYPT 2008: 27th Annual …, 2008 - Springer
We construct obfuscators of point functions with multibit output and other related functions. A
point function with multibit output returns a fixed string on a single input point and zero …
point function with multibit output returns a fixed string on a single input point and zero …
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model
Copy-protection allows a software distributor to encode a program in such a way that it can
be evaluated on any input, yet it cannot be" pirated"–a notion that is impossible to achieve in …
be evaluated on any input, yet it cannot be" pirated"–a notion that is impossible to achieve in …
On strong simulation and composable point obfuscation
Abstract The Virtual Black Box (VBB) property for program obfuscators provides a strong
guarantee: anything computable by an efficient adversary, given the obfuscated program …
guarantee: anything computable by an efficient adversary, given the obfuscated program …
Obfuscation of hyperplane membership
Previous work on program obfuscation gives strong negative results for general-purpose
obfuscators, and positive results for obfuscating simple functions such as equality testing …
obfuscators, and positive results for obfuscating simple functions such as equality testing …