منابع مشابه
Obfuscation, Leakage and UCE
This paper addresses the fundamental question of whether or not different, exciting primitives now being considered actually exist. We show that we, unfortunately, cannot have them all. We provide results of the form ¬A∨¬B, meaning one of the primitives A,B cannot exist. (But we don’t know which.) Specifically, we show that: (1) VGBO (Virtual Grey Box Obfuscation) for all circuits, which has be...
متن کاملCode and Proof Obfuscation
ions Since we want our analysis to be sound (i.e. to nd all errors), we need to abstract in a conservative manner, all properties being represented by an over-approximation of it. Moreover, we would like to have a unique best abstract property for each concrete property. Given a concrete complete lattice (D,⊆, ⋂ , ⋂ ), an abstraction of D is thus a sublattice D with induced order and bounds suc...
متن کاملObfuscation Combiners
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side. This motivates us to study and present robust combiners for obfuscators, which integrate several candidate obfuscators into ...
متن کاملPatchable Obfuscation
In this work, we introduce patchable obfuscation: our notion adapts the notion of indistinguishability obfuscation (iO) to a very general setting where obfuscated software evolves over time. We model this broadly by considering software patches P as arbitrary Turing Machines that take as input the description of a Turing Machine M , and output a new Turing Machine description M ′ = P (M). Thus,...
متن کاملIndistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
In a recent celebrated breakthrough, Garg et al. (FOCS 2013) gave the first candidate for so-called indistinguishability obfuscation (iO) thereby reviving the interest in obfuscation for a general purpose. Since then, iO has been used to advance numerous sub-areas of cryptography. While indistinguishability obfuscation is a general purpose obfuscation scheme, several obfuscators for specific fu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Object Technology
سال: 2005
ISSN: 1660-1769
DOI: 10.5381/jot.2005.4.4.c6