Program Obfuscation with Leaky Hardware

We consider general program obfuscation mechanisms using “somewhat trusted” hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the...

Full description

Bibliographic Details
Main Authors: Bitansky, Nir, Canetti, Ran, Goldwasser, Shafi, Halevi, Shai, Kalai, Yael Tauman, Rothblum, Guy N.
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Format: Article
Language:en_US
Published: Springer-Verlag Berlin Heidelberg 2014
Online Access:http://hdl.handle.net/1721.1/86914
https://orcid.org/0000-0003-4728-1535