A general and efficient obfuscation for programs with tamper-proof hardware

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Obfuscating programs is a fascinating area of cryptography. The known general method of obfuscating programs with tamper-proof hardware is to first transform a program P to the corresponding ensemble of circuits and then apply the known obfuscation for circuits, e.g. the one by Goyal et al. in TCC'10, to obfuscate some circuit in the ensemble. We think there may exist two shortcomings in this method. One is the size of the obfuscated circuit is polynomial in P's running-time instead of P's length. Another one is that the obfuscated circuit can only be run on inputs of fixed length instead of inputs of any length. In this paper we propose a general and efficient obfuscation for programs rather than circuits with tamper-proof hardware. The size of our obfuscated program for P is polynomial in P's length and the program can by run on an arbitrary polynomially long input. © 2011 Springer-Verlag Berlin Heidelberg.

Author supplied keywords

Cite

CITATION STYLE

APA

Ding, N., & Gu, D. (2011). A general and efficient obfuscation for programs with tamper-proof hardware. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6672 LNCS, pp. 401–416). https://doi.org/10.1007/978-3-642-21031-0_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free