Cloud

Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions

Download Now Free registration required

Executive Summary

Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obfuscation has been proven impossible and the research then focused on obfuscating very specific functions, studying weaker security definitions for obfuscation, and using tamper-proof hardware tokens to achieve general code obfuscation. Following this last line, this paper presents the first scheme which bases general code obfuscation of multiple programs on one single stateless hardware token.

  • Format: PDF
  • Size: 397.37 KB