Recent Results on Indistinguishability Obfuscation

نویسندگان

  • Prastudy Fauzi
  • Dominique Unruh
چکیده

In this research, the student will explain a candidate construction for indistinguishability obfuscation, based on a recent paper by Garg et al. (FOCS 2013). This is done by first describing the main building blocks, then how these are used to build indistinguishability obfuscation for NC, and expanded to P/poly. Security and alternative constructions are very briefly discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Indistinguishability Obfuscation: From Approximate to Exact

We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 + fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. As a step towards our results, which i...

متن کامل

Survey on Cryptographic Obfuscation

The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic attitude towards general purpose cryptographic obfuscation. Since their first candidate construction, several authors proposed newer and newer schemes with more persuasive security arguments and better efficiency. At the same time, indistinguishability obfuscation proved its extreme usefulness by becoming the basis ...

متن کامل

Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation

We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and one-way functions, thereby providing the first candidate that is not based on the hardness of factoring. Our construction shows that even highly structured primitives, such as trapdoor permutations, can be potentially based on hardness assumptions with noisy structures such as those used in candid...

متن کامل

Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input

In a recent celebrated breakthrough, Garg et al. (FOCS 2013) gave the first candidate for so-called indistinguishability obfuscation (iO) thereby reviving the interest in obfuscation for a general purpose. Since then, iO has been used to advance numerous sub-areas of cryptography. While indistinguishability obfuscation is a general purpose obfuscation scheme, several obfuscators for specific fu...

متن کامل

Applicability of Indistinguishability Obfuscation Seminar report for Research Seminar in Cryptography

The intuitive meaning of obfuscation is taking a program and turning it into a program with the same functionality but somehow unintelligible structure. There have been practical approaches at obfuscating computer programs, but until 2001 [BGI01] there was not much theory in this field. Especially, it was not well defined what is meant by obfuscation. The main step of specifying the meaning of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014