PPT-Obfuscation for Evasive Functions
Author : aaron | Published Date : 2018-03-10
Boaz Barak Nir Bitansky Ran Canetti Yael Tauman Kalai Omer Paneth Amit Sahai Program Obfuscation Obfuscated Program Approved Document Signature Obfuscation
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Obfuscation for Evasive Functions" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Obfuscation for Evasive Functions: Transcript
Boaz Barak Nir Bitansky Ran Canetti Yael Tauman Kalai Omer Paneth Amit Sahai Program Obfuscation Obfuscated Program Approved Document Signature Obfuscation Verify and sign. Grey-Box . Obfuscation for General Circuits. Nir. . Bitansky. . Ran Canetti. Yael . Tauman-Kalai. . Omer . Paneth. Program Obfuscation. Obfuscated program. . . Obfuscation. Program. . . Private Key to Public Key. Auxiliary Input or a Universal Simulator. Nir. . Bitansky. . Ran Canetti. Henry Cohn. Shafi. . Goldwasser. Yael . Tauman-Kalai. . Omer Paneth. Alon. Rosen. Program Obfuscation. Obfuscated program. Evasive Functions. Boaz . Barak, . Nir. . Bitansky. , Ran Canetti,. Yael Tauman . Kalai, . Omer . Paneth, . Amit Sahai. Program Obfuscation . Obfuscated Program. Approved . Document . Signature . Obfuscation. Boaz . Barak . Sanjam. . Garg. Yael . Tauman . Kalai . Omer Paneth . Amit . Sahai. Program Obfuscation . Public Key. . . Obfuscation. . . . Virtual Black-Box (VBB). [. Barak-. Goldreich. -. Nir. . Bitansky. and Omer . Paneth. Program Obfuscation. Compute . . . . Program Obfuscation. . . Program Obfuscation. Sign email . with . If . starts with “omer@bu.edu”. . . . Zeev . Dvir. (Princeton). Shachar. Lovett (IAS). STOC 2012. Subspace evasive sets. is . (. k,c. ) subspace evasive. if for any k-dimensional linear subspace V, . Motivation. is . Shai Halevi. Obfuscation. China Summer School on Lattices and Cryptography, June 2014. Code Obfuscation. Encrypting programs, maintaining functionality. Only the functionality should be “visible” in the output. Ms. Mendoza’s Class. ELA. Week of May 8-12. PUNG. Meaning: point, pierce. Example: expunge (to remove completely from something). “The lawyer successfully . expunged. the convict’s record.” . Nir. . Bitansky. and Omer . Paneth. Program Obfuscation. Compute . . . . Program Obfuscation. . . Program Obfuscation. Sign email . with . If . starts with “omer@bu.edu”. . . . Boaz . Barak . Sanjam. . Garg. Yael . Tauman . Kalai . Omer Paneth . Amit . Sahai. Program Obfuscation . Public Key. . . Obfuscation. . . . Virtual Black-Box (VBB). [. Barak-. Goldreich. -. Goyal. . Venkata. . Koppula. Brent Waters. Lockable Obfuscation. . . Correctness: . Challenger. Attacker. Lockable . Obfuscation: Security. OR. Guess. could . be from . high . entropy . dist. . ELA. Week of May 8-12. PUNG. Meaning: point, pierce. Example: expunge (to remove completely from something). “The lawyer successfully . expunged. the convict’s record.” . . PLAC. Meaning; please, suit, be acceptable . Sanjam. . Garg. , Craig Gentry*, . Shai Halevi*. ,. Mariana . Raykova. , . Amit. . Sahai. , Brent Waters. Faces in Modern Cryptography, Oct-2013. A Celebration in Honor of . . Goldwasser. . and . Shai Halevi – IBM Research. NYU Security Research Seminar. April 1, 2014. 1. Cryptography. Traditional View: . securing communication. Replicate in the digital world the functionality of sealed envelopes/Brinks cars.
Download Document
Here is the link to download the presentation.
"Obfuscation for Evasive Functions"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents