PPT-Virtual Grey-Boxes Beyond Obfuscation: A Statistical Securi

Author : cheryl-pisano | Published Date : 2017-12-26

for Cryptographic Agents Shashank Agrawal Manoj Prabhakaran ChingHua Yu Security Guarantee in Cryptography A cryptographic scheme can provide certain security

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Virtual Grey-Boxes Beyond Obfuscation: A..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Virtual Grey-Boxes Beyond Obfuscation: A Statistical Securi: Transcript


for Cryptographic Agents Shashank Agrawal Manoj Prabhakaran ChingHua Yu Security Guarantee in Cryptography A cryptographic scheme can provide certain security properties Modern cryptography have involved properties. Grey-Box . Obfuscation for General Circuits. Nir. . Bitansky. . Ran Canetti. Yael . Tauman-Kalai. . Omer . Paneth. Program Obfuscation. Obfuscated program.  .  . Obfuscation. Program.  .  . Private Key to Public Key. Auxiliary Input or a Universal Simulator. Nir. . Bitansky. . Ran Canetti. Henry Cohn. Shafi. . Goldwasser. Yael . Tauman-Kalai. . Omer Paneth. Alon. Rosen. Program Obfuscation. Obfuscated program. Evasive Functions. Boaz . Barak, . Nir. . Bitansky. , Ran Canetti,. Yael Tauman . Kalai, . Omer . Paneth, . Amit Sahai. Program Obfuscation . Obfuscated Program. Approved . Document . Signature . Obfuscation. Boaz . Barak . Sanjam. . Garg. Yael . Tauman . Kalai . Omer Paneth . Amit . Sahai. Program Obfuscation . Public Key.  .  . Obfuscation.  .  .  . Virtual Black-Box (VBB). [. Barak-. Goldreich. -. Nir. . Bitansky. and Omer . Paneth. Program Obfuscation. Compute .  .  .  . Program Obfuscation.  .  . Program Obfuscation. Sign email . with . If . starts with “omer@bu.edu”.  .  .  . Program . Obfuscation. Omer Singer. June 8, 2009. Practical Background. What is program obfuscation?. Obfuscation is deliberately making software code so confusing that even those with access to the code can’t figure out what a program is going to do.. Boaz . Barak, . Nir. . Bitansky. , Ran Canetti,. Yael Tauman . Kalai, . Omer . Paneth, . Amit Sahai. Program Obfuscation . Obfuscated Program. Approved . Document . Signature . Obfuscation. Verify and sign. for Cryptographic. . Agents. Shashank Agrawal, . Manoj. . Prabhakaran. , . Ching-Hua Yu. Security Guarantee in Cryptography. A cryptographic scheme can provide certain security properties. Modern cryptography have involved properties. Nir. . Bitansky. and Omer . Paneth. Program Obfuscation. Compute .  .  .  . Program Obfuscation.  .  . Program Obfuscation. Sign email . with . If . starts with “omer@bu.edu”.  .  .  . , Omer . Paneth. On Obfuscation with Random Oracles. [. Lynn-Prabhakaran-Sahai 04. ]:. Can simulation based obfuscation . be constructed with a . Random Oracle. ?. Today: . Impossible . in general!. A Candidate Obfuscator. Boaz . Barak . Sanjam. . Garg. Yael . Tauman . Kalai . Omer Paneth . Amit . Sahai. Program Obfuscation . Public Key.  .  . Obfuscation.  .  .  . Virtual Black-Box (VBB). [. Barak-. Goldreich. -. Goyal. . Venkata. . Koppula. Brent Waters. Lockable Obfuscation. . . Correctness: . Challenger. Attacker. Lockable . Obfuscation: Security. OR. Guess. could . be from . high . entropy . dist.  . Sanjam. . Garg. , Craig Gentry*, . Shai Halevi*. ,. Mariana . Raykova. , . Amit. . Sahai. , Brent Waters. Faces in Modern Cryptography, Oct-2013. A Celebration in Honor of . . Goldwasser. . and . Shai Halevi – IBM Research. NYU Security Research Seminar. April 1, 2014. 1. Cryptography. Traditional View: . securing communication. Replicate in the digital world the functionality of sealed envelopes/Brinks cars.

Download Document

Here is the link to download the presentation.
"Virtual Grey-Boxes Beyond Obfuscation: A Statistical Securi"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents