
Indistinguishability Obfuscation from Well-Studied Assumptions
- software
- Categories:Computers & Internet
- Language:English(Translation Services Available)
- Publication date:April,2025
- Pages:277
- Retail Price:(Unknown)
- Size:190mm×235mm
- Publication Place:United States
- Words:(Unknown)
- Star Ratings:
- Text Color:(Unknown)
Request for Review Sample
Through our website, you are submitting the application for you to evaluate the book. If it is approved, you may read the electronic edition of this book online.
Special Note:
The submission of this request means you agree to inquire the books through RIGHTOL,
and undertakes, within 18 months, not to inquire the books through any other third party,
including but not limited to authors, publishers and other rights agencies.
Otherwise we have right to terminate your use of Rights Online and our cooperation,
as well as require a penalty of no less than 1000 US Dollars.
Description
As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation.
The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.