Categories

you may like

Indistinguishability Obfuscation from Well-Studied Assumptions

  • software
  • Categories:Computers & Internet
  • Language:English(Translation Services Available)
  • Publication date:April,2025
  • Pages:277
  • Retail Price:(Unknown)
  • Size:190mm×235mm
  • Publication Place:United States
  • Words:(Unknown)
  • Star Ratings:
  • Text Color:(Unknown)
You haven’t logged in yet. Sign In to continue.

Request for Review Sample

Through our website, you are submitting the application for you to evaluate the book. If it is approved, you may read the electronic edition of this book online.

English title 《 Indistinguishability Obfuscation from Well-Studied Assumptions 》
Copyright Usage
Application
 

Special Note:
The submission of this request means you agree to inquire the books through RIGHTOL, and undertakes, within 18 months, not to inquire the books through any other third party, including but not limited to authors, publishers and other rights agencies. Otherwise we have right to terminate your use of Rights Online and our cooperation, as well as require a penalty of no less than 1000 US Dollars.


Description

Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes.

As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation.

The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.

Author

Aayush Jain is an assistant professor in computer science at Carnegie Mellon University. He received his Ph.D. from UCLA under the supervision of Amit Sahai. Before that, he received his undergraduate degree from IIT Delhi. Aayush is interested in cryptography and its fascinating connections with areas of theoretical computer science. His current interests include the design of advanced cryptographic primitives such as obfuscation and homomorphic and functional encryption schemes. He's excited about expanding the scope of modern cryptography through the investigation of new sources of cryptography-friendly hard problems.

Explore​

Management & Leaders…
Marketing & Sales
Communication & Soci…
Communication & Soci…

Share via valid email address:


Back
© 2025 RIGHTOL All Rights Reserved.