On Best-Possible Obfuscation

@inproceedings{Goldwasser2007OnBO,
  title={On Best-Possible Obfuscation},
  author={S. Goldwasser and G. N. Rothblum},
  booktitle={TCC},
  year={2007}
}
  • S. Goldwasser, G. N. Rothblum
  • Published in TCC 2007
  • Mathematics, Computer Science
  • An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output functionality as the original program, but is "unintelligible". Obfuscation has applications for cryptography and for software protection. Barak et al. initiated a theoretical study of obfuscation, which focused on black-box obfuscation, where the obfuscated circuit should leak no information except for its… CONTINUE READING
    132 Citations
    Studies in program obfuscation
    • 10
    • Highly Influenced
    On Obfuscating Programs with Tamper-proof Hardware
    • 1
    On the Concept of Software Obfuscation in Computer Security
    • 34
    • Highly Influenced
    • PDF
    One-Way Functions and (Im)Perfect Obfuscation
    • 59
    • PDF
    On Strong Simulation and Composable Point Obfuscation
    • 37
    • Highly Influenced
    • PDF
    Structural transformation for best-possible obfuscation of sequential circuits
    • L. Li, H. Zhou
    • Computer Science
    • 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
    • 2013
    • 37
    • PDF
    Circuit Obfuscation Using Braids
    • 5
    • Highly Influenced
    • PDF
    Stochastic Optimization of Program Obfuscation
    • 17
    More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
    • 9
    • PDF
    On Quantum Obfuscation
    • 22
    • PDF

    References

    SHOWING 1-10 OF 23 REFERENCES
    Positive Results and Techniques for Obfuscation
    • 234
    • Highly Influential
    • PDF
    On the (Im)possibility of Obfuscating Programs
    • 1,382
    • PDF
    On the impossibility of obfuscation with auxiliary input
    • S. Goldwasser, Y. Kalai
    • Mathematics, Computer Science
    • 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05)
    • 2005
    • 199
    • PDF
    On obfuscating point functions
    • H. Wee
    • Computer Science, Mathematics
    • STOC '05
    • 2005
    • 244
    • PDF
    Obfuscated databases and group privacy
    • 53
    • PDF
    Correcting errors without leaking partial information
    • 174
    • PDF
    Statistical Zero-Knowledge Languages can be Recognized in Two Rounds
    • 125
    • PDF
    Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information
    • 345
    • Highly Influential
    • PDF
    Perfectly one-way probabilistic hash functions (preliminary version)
    • 135
    • PDF
    On the (In)security of the Fiat-Shamir paradigm
    • S. Goldwasser, Y. Kalai
    • Computer Science, Mathematics
    • 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings.
    • 2003
    • 317
    • PDF