Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Function secret sharing

E Boyle, N Gilboa, Y Ishai - Annual international conference on the theory …, 2015 - Springer
Motivated by the goal of securely searching and updating distributed data, we introduce and
study the notion of function secret sharing (FSS). This new notion is a natural generalization …

Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation

D Boneh, K Lewi, M Raykova, A Sahai… - … Conference on the …, 2015 - Springer
Deciding “greater-than” relations among data items just given their encryptions is at the
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …

Indistinguishability obfuscation from functional encryption

N Bitansky, V Vaikuntanathan - Journal of the ACM (JACM), 2018 - dl.acm.org
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …

Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation

D Boneh, M Zhandry - Algorithmica, 2017 - Springer
In this work, we show how to use indistinguishability obfuscation to build multiparty key
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …

Indistinguishability obfuscation from compact functional encryption

P Ananth, A Jain - Annual Cryptology Conference, 2015 - Springer
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …

Graph-induced multilinear maps from lattices

C Gentry, S Gorbunov, S Halevi - Theory of Cryptography: 12th Theory of …, 2015 - Springer
Graded multilinear encodings have found extensive applications in cryptography ranging
from non-interactive key exchange protocols, to broadcast and attribute-based encryption …

Protecting obfuscation against algebraic attacks

B Barak, S Garg, YT Kalai, O Paneth… - Advances in Cryptology …, 2014 - Springer
Abstract Recently, Garg, Gentry, Halevi, Raykova, Sahai, and Waters (FOCS 2013)
constructed a general-purpose obfuscating compiler for NC 1 circuits. We describe a …

Hopes, fears, and software obfuscation

B Barak - Communications of the ACM, 2016 - dl.acm.org
Hopes, fears, and software obfuscation Page 1 88 COMMUNICATIONS OF THE ACM |
MARCH 2016 | VOL. 59 | NO. 3 review articles DOI:10.1145/2757276 What does it mean to be …