Non-malleable Obfuscation

被引:0
作者
Canetti, Ran [1 ]
Varia, Mayank [2 ]
机构
[1] Tel Aviv Univ, Sch Comp Sci, Tel Aviv, Israel
[2] MIT, Cambridge, MA 02139 USA
来源
THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009 | 2009年 / 5444卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfuscated) program that is related to the original one in some way. We formulate two natural flavors of non-malleability requirements for program obfuscation, and show that they are incomparable in general. We also construct non-malleable obfuscators of both flavors for some program families of interest. Some of our constructions are in the Random Oracle model, whereas another one is in the common reference string model. We also define the notion of verifiable obfuscation which is of independent interest.
引用
收藏
页码:73 / +
页数:2
相关论文
共 14 条
  • [1] [Anonymous], 2001, CRYPTO 2001, DOI DOI 10.1007/3-540-44647-81
  • [2] [Anonymous], 2005, FDN COMP SCI 2005 FO
  • [3] [Anonymous], SRICSL98 INT COMP SC
  • [4] [Anonymous], 2001, LNCS, DOI DOI 10.1007/3-540-44647-8
  • [5] Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P131, DOI 10.1145/276698.276721
  • [6] Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
  • [7] CANETTI R, 2008, NONMALLABLE OBFUSCAT
  • [8] Canetti R, 2008, LECT NOTES COMPUT SC, V4965, P489
  • [9] Goldwasser S, 2007, LECT NOTES COMPUT SC, V4392, P194
  • [10] Hofheinz D, 2007, LECT NOTES COMPUT SC, V4392, P214