Obfuscating Point Functions with Multibit Output

نویسندگان

  • Ran Canetti
  • Ronny Ramzi Dakdouk
چکیده

We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero everywhere else. We provide a construction that obfuscates these functions. The construction is generic in the sense that it can use any perfectly one-way (POW) function or obfuscator for point functions. Analyzing this construction reveals gaps in the definition of obfuscation, specifically, that it does not guarantee security even under self-composition, a property needed in our analysis. Thus, we use obfuscation secure under composition. In particular, we show that composable obfuscation of multibit point functions exists if and only if composable obfuscation of point functions exists. Moreover, we show that this construction is secure based on statistically indistinguishable POW functions. However, if we relax the assumption to computational indistinguishability, then the construction satisfies a weaker notion of obfuscation. Finally, the same technique can be used to obfuscate set-membership predicates and functions, for polynomial-size sets.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Obfuscatietechnieken voor programmabeveiliging Application Security through Program Obfuscation

Business models behind products such as iTunes and the Skype VoIP clients depend entirely on the secrecy of technical details of their product. Once the technical details are uncovered, a medium such as the Internet is extremely powerful to (anonymously) spread the sensitive information and it is shown that stopping the spread of such highly sensitive information is difficult. Therefore, progra...

متن کامل

Optimization of Multibit Watermarking

This Chapter presents a Multibit Improved Spread Spectrum modulation (MISS) by properly adjusting the energy of the pseudo random sequences modulated by Code Division (CDM). We extend the one-bit spread spectrum watermarking approach proposed by Henrique S. Malvar and Dinei A. F. Florencio (2003) to multibit watermarking by using an optimization procedure to achieve the best performance possibl...

متن کامل

Application of Multibit Flip-Flops by Using Carry Look Ahead Adder

The consumption of power has become an important issue in modern VLSI design. Power consumption can be reduced by replacing some flip-flops with fewer multi-bit flip-flops. Multi-bit flip-flop is one of the methods for clock power consumption reduction. This project focuses on reduction of power using multi-bit flipflops by clock synchronization. Two single bit flip-flops are synchronized with ...

متن کامل

Packet Classification Using Pipelined Multibit Tries

We propose heuristics for the construction of variable-stride one-dimensional as well as fixedand variablestride two-dimensional multibit tries. These multibit tries are suitable for the classification of Internet packets using a pipelined architecture. The variable-stride one-dimensional tries constructed by our heuristic require significantly less per-stage memory than required by optimal pip...

متن کامل

Image watermarking with feature point based synchronization robust to print-scan attack

In this paper we propose a content based multibit watermarking method robust to print–scan attack. A method to extract feature points, robust in terms of watermarking, is proposed. The location of the watermark is tied to a coordinate system defined by robust feature points. A message sequence is mapped to a directional angle of periodic patterns, which are scattered and embedded into triangles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008