How to construct random functions
Journal of the ACM (JACM)
Communications of the ACM
On the (Im)possibility of Obfuscating Programs
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
LICS '98 Proceedings of the 13th Annual IEEE Symposium on Logic in Computer Science
Hi-index | 0.00 |
Shannon's notion of entropy remains a benchmark reference for understanding information and data content of cryptosystems. Ideally, secure ciphers maintain high entropy between possible plaintextciphertext pairs. The one time pad, though perfectly secure in terms of entropy, remains impractical in most general cases due to key management issues. We discuss in this paper the similar notion of function entropy and examine its use on a small scale to provide perfect functional secrecy. We illustrate how such small units of composition can form the basis for obfuscating software transformations in a general, but highly constrained sense.