One-Time Programs

@inproceedings{Goldwasser2008OneTimeP,
  title={One-Time Programs},
  author={S. Goldwasser and Y. Kalai and G. N. Rothblum},
  booktitle={CRYPTO},
  year={2008}
}
  • S. Goldwasser, Y. Kalai, G. N. Rothblum
  • Published in CRYPTO 2008
  • Computer Science
  • In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a singleinput, whose value can be specified at run time. Other than the result of the computation on this input, nothing else about the program is leaked. Hence, a one-time program is like a black box function that may be evaluated once and then "self destructs." This also extends to k-time programs, which are like black box functions that can be… CONTINUE READING
    205 Citations
    One-Time Programs made Practical
    • 2
    • Highly Influenced
    • PDF
    Quantum one-time programs
    • 50
    • PDF
    One-Time Programs with Limited Memory
    • 6
    • Highly Influenced
    • PDF
    Quantum One-Time Programs - (Extended Abstract)
    • 20
    • PDF
    Obfuscating straight line arithmetic programs
    • 3
    • PDF
    A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware
    • 4
    On Obfuscating Programs with Tamper-proof Hardware
    • 1
    Program Obfuscation with Leaky Hardware
    • 40
    • PDF

    References

    SHOWING 1-10 OF 43 REFERENCES
    On the (Im)possibility of Obfuscating Programs
    • 1,382
    • PDF
    Software protection and simulation on oblivious RAMs
    • 1,403
    • PDF
    On the Secure Obfuscation of Deterministic Finite Automata
    • W. Anderson
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2008
    • 18
    • PDF
    On the impossibility of obfuscation with auxiliary input
    • S. Goldwasser, Y. Kalai
    • Mathematics, Computer Science
    • 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05)
    • 2005
    • 199
    • PDF
    Private Circuits II: Keeping Secrets in Tamperable Circuits
    • 162
    • PDF
    Virtual Leashing: Creating a computational foundation for software protection
    • 3
    • PDF
    Advances in Cryptology — CRYPTO’ 88: Proceedings
    • S. Goldwasser
    • Computer Science
    • Lecture Notes in Computer Science
    • 1990
    • 335
    Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • 1,310
    • PDF