2012
DOI: 10.1145/2160158.2160159
|View full text |Cite
|
Sign up to set email alerts
|

On the (im)possibility of obfuscating programs

Abstract: Informally, an obfuscator O is an (efficient, probabilistic) "compiler" that takes as input a program (or circuit) P and produces a new program O(P) that has the same functionality as P yet is "unintelligible" in some sense. Obfuscators, if they exist, would have a wide variety of cryptographic and complexity-theoretic applications, ranging from software protection to homomorphic encryption to complexity-theoretic analogues of Rice's theorem. Most of these applications are based on an interpretation of the "un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 357 publications
(35 citation statements)
references
References 47 publications
0
35
0
Order By: Relevance
“…Due to its diverse and far reaching applications, program obfuscation has been long considered as a holy grail of cryptography. However, hopes of attaining highly secure obfuscation were diminished in 2011 by an impossibility proof [14] (note, however that weaker security notions are attainable [115]). The situation is completely different in the quantum case, since the proof technique is not applicable (essentially due to the nocloning theorem).…”
Section: Conclusion and Open Problemsmentioning
confidence: 99%
“…Due to its diverse and far reaching applications, program obfuscation has been long considered as a holy grail of cryptography. However, hopes of attaining highly secure obfuscation were diminished in 2011 by an impossibility proof [14] (note, however that weaker security notions are attainable [115]). The situation is completely different in the quantum case, since the proof technique is not applicable (essentially due to the nocloning theorem).…”
Section: Conclusion and Open Problemsmentioning
confidence: 99%
“…Indistinguishability Obfuscation (iO) was proposed in [1,2]. Informally, it requires that the obfuscations of two distinct but equal-sized programs, which implement identical functionality, are computationally indistinguishable.…”
Section: Indistinguishability Obfuscation (Io) and Puncturable Prfsmentioning
confidence: 99%
“…Let C (the counterfeiter) be a quantum circuit of size poly (n) that takes k public as input 11 and does the following:…”
Section: Cryptographymentioning
confidence: 99%
“…10 We indulge in slight abuse of notation, since if Sign is randomized then the signature need not be a function of k private and x. 11 Actually, for our security proofs, it suffices to consider a weaker attack model, in which C only receives k public at the same time as it receives w 1 , . .…”
Section: Cryptographymentioning
confidence: 99%
See 1 more Smart Citation