We propose a new way to obfuscate programs, using composite-order multilinear maps. Our construction operates directly on straight-line programs (arithmetic circuits), rather than converting them to matrix branching programs as in other known approaches. This yields considerable efficiency improvements. For an NC1 circuit of size s and depth d, with n inputs, we require only O(d2s2 + n2) multilinear map operations to evaluate the obfuscated circuit—as compared with other known approaches, for which the number of operations is exponential in d. We prove virtual black-box (VBB) security for our construction in a generic model of multilinear maps of hidden composite order, extending previous models for the prime-order setting. Our scheme works...
A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that...
In this work, we present a new obfuscator using a Graded Encoding Scheme (GES) with a binary slot. W...
We construct a VBB and perfect circuit-hiding obfuscator for evasive deterministic finite automata u...
We present a candidate obfuscator based on composite-order Graded Encoding Schemes (GES), which are ...
In this work, we seek to extend the capabilities of the “core obfuscator ” from the work of Garg, Ge...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
Obfuscation, the task of compiling circuits or programs to make the internal computation un-intellig...
Multilinear maps enable homomorphic computation on encoded values and a public procedure to check if...
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation schemes. We f...
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation schemes. We f...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted signifi-cant g...
Annihilation attacks, introduced in the work of Miles, Sahai, and Zhandry (CRYPTO 2016), are a class...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that...
In this work, we present a new obfuscator using a Graded Encoding Scheme (GES) with a binary slot. W...
We construct a VBB and perfect circuit-hiding obfuscator for evasive deterministic finite automata u...
We present a candidate obfuscator based on composite-order Graded Encoding Schemes (GES), which are ...
In this work, we seek to extend the capabilities of the “core obfuscator ” from the work of Garg, Ge...
Program Obfuscation is the art of making computer programs ``unintelligible" while preserving its f...
Obfuscation, the task of compiling circuits or programs to make the internal computation un-intellig...
Multilinear maps enable homomorphic computation on encoded values and a public procedure to check if...
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation schemes. We f...
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation schemes. We f...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
Recent devastating attacks by Cheon et al. [Eurocrypt’15] and others have highlighted signifi-cant g...
Annihilation attacks, introduced in the work of Miles, Sahai, and Zhandry (CRYPTO 2016), are a class...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
2017, Science Press. All right reserved. Currently, there are two kind of implementing the programs\...
A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that...
In this work, we present a new obfuscator using a Graded Encoding Scheme (GES) with a binary slot. W...
We construct a VBB and perfect circuit-hiding obfuscator for evasive deterministic finite automata u...