Program obfuscation with leaky hardware

    IACR Cryptology ePrint Archive, pp. 722-739, 2011.

    Cited by: 40|Bibtex|Views27|Links
    EI
    Keywords:
    short outputrequired trusthardware componenthardware devicefollowing propertyMore(7+)

    Abstract:

    We consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky. That is,...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments