Program obfuscation with leaky hardware

Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky. That is, the adversary can obtain the result of evaluating any function on the local state of the device, as long as this function has short output. In addition the adversary also controls the communication between the devices. (ii) The number of hardware devices used in an obfuscation and the amount of work they perform are polynomial in the security parameter independently of the obfuscated function's complexity. (iii) A (universal) set of hardware components, owned by the user, is initialized only once and from that point on can be used with multiple "software- based" obfuscations sent by different vendors.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
Pages722-739
Number of pages18
DOIs
StatePublished - 2011
Event17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011 - Seoul, Korea, Republic of
Duration: Dec 4 2011Dec 8 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7073 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011
Country/TerritoryKorea, Republic of
CitySeoul
Period12/4/1112/8/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Program obfuscation with leaky hardware'. Together they form a unique fingerprint.

Cite this