A general and efficient obfuscation for programs with tamper-proof hardware

  • Authors:
  • Ning Ding;Dawu Gu

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, China

  • Venue:
  • ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Obfuscating programs is a fascinating area of cryptography. The known general method of obfuscating programs with tamperproof hardware is to first transform a program P to the corresponding ensemble of circuits and then apply the known obfuscation for circuits, e.g. the one by Goyal et al. in TCC'10, to obfuscate some circuit in the ensemble. We think there may exist two shortcomings in this method. One is the size of the obfuscated circuit is polynomial in P's running-time instead of P's length. Another one is that the obfuscated circuit can only be run on inputs of fixed length instead of inputs of any length. In this paper we propose a general and efficient obfuscation for programs rather than circuits with tamper-proof hardware. The size of our obfuscated program for P is polynomial in P's length and the program can by run on an arbitrary polynomially long input.