Program Obfuscation with Leaky Hardware
We consider general program obfuscation mechanisms using “somewhat trusted” hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the...
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | en_US |
Published: |
Springer-Verlag Berlin Heidelberg
2014
|
Online Access: | http://hdl.handle.net/1721.1/86914 https://orcid.org/0000-0003-4728-1535 |