Practical implementations of program obfuscators for point functions

Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Yuriy Polyakov, Kurt Rohloff, David B. Cousins

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

Point function obfuscators have recently been shown to be the first examples of program obfuscators provable under hardness assumptions commonly used in cryptography. This is remarkable, in light of early results in this area, showing impossibility of a single obfuscation solution for all programs. Point functions can be seen as functions that return 1 if the input value is equal to a secret value stored in the program, and 0 otherwise. In this paper, we select representative point function obfuscators from the literature, state their theoretical guarantees, and report on their (slightly) optimized implementations. We show that implementations of point function obfuscators, satisfying different obfuscation notions, can be used with practical performance guarantees. Notable implementation results due to our design and coding optimizations are: (a) very fast obfuscators based on group theory, and (b) obfuscators based on lattice theory with running time < 8s, using inexpensive computing resources.

Original languageEnglish (US)
Title of host publication2016 International Conference on High Performance Computing and Simulation, HPCS 2016
EditorsVesna Zeljkovic, Waleed W. Smari
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages460-467
Number of pages8
ISBN (Electronic)9781509020881
DOIs
StatePublished - Sep 13 2016
Event14th International Conference on High Performance Computing and Simulation, HPCS 2016 - Innsbruck, Austria
Duration: Jul 18 2016Jul 22 2016

Publication series

Name2016 International Conference on High Performance Computing and Simulation, HPCS 2016

Other

Other14th International Conference on High Performance Computing and Simulation, HPCS 2016
Country/TerritoryAustria
CityInnsbruck
Period7/18/167/22/16

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Numerical Analysis
  • Computer Networks and Communications
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Practical implementations of program obfuscators for point functions'. Together they form a unique fingerprint.

Cite this