Bootstrapping: From the Seed to the Flower

The key question that bootstrapping seeks to answer is the following: what is the simplest object that we can to transform into a general-purpose obfuscator using standard cryptographic assumptions?

  • PDF / 1,892,673 Bytes
  • 122 Pages / 439.37 x 666.142 pts Page_size
  • 6 Downloads / 185 Views

DOWNLOAD

REPORT


Máté Horváth · Levente Buttyán

Cryptographic Obfuscation A Survey

123

SpringerBriefs in Computer Science Series Editors Stan Zdonik, Brown University, Providence, RI, USA Shashi Shekhar, University of Minnesota, Minneapolis, MN, USA Xindong Wu, University of Vermont, Burlington, VT, USA Lakhmi C. Jain, University of South Australia, Adelaide, SA, Australia David Padua, University of Illinois Urbana-Champaign, Urbana, IL, USA Xuemin Sherman Shen, University of Waterloo, Waterloo, ON, Canada Borko Furht, Florida Atlantic University, Boca Raton, FL, USA V. S. Subrahmanian, University of Maryland, College Park, MD, USA Martial Hebert, Carnegie Mellon University, Pittsburgh, PA, USA Katsushi Ikeuchi, University of Tokyo, Tokyo, Japan Bruno Siciliano, Università di Napoli Federico II, Napoli, Italy Sushil Jajodia, George Mason University, Fairfax, VA, USA Newton Lee, Institute for Education, Research and Scholarships, Los Angeles, CA, USA

SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 125 pages, the series covers a range of content from professional to academic. Typical topics might include: • A bridge between new research results, as published in journal articles, and a contextual literature review • A snapshot of a hot or emerging topic • An in-depth case study or clinical example • A presentation of core concepts that students must understand in order to make independent contributions Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. Briefs will be published as part of Springer’s eBook collection, with millions of users worldwide. In addition, Briefs will be available for individual print and electronic purchase. Briefs are characterized by fast, global electronic dissemination, standard publishing contracts, easy-to-use manuscript preparation and formatting guidelines, and expedited production schedules. We aim for publication 8–12 weeks after acceptance. Both solicited and unsolicited manuscripts are considered for publication in this series. **Indexing: This series is indexed in Scopus and zbMATH **

More information about this series at http://www.springer.com/series/10028

Máté Horváth Levente Buttyán •

Cryptographic Obfuscation A Survey

123

Máté Horváth Department of Networked Systems and Services Budapest University of Technology and Economics (BME-HIT) Budapest, Hungary

Levente Buttyán Department of Networked Systems and Services Budapest University of Technology and Economics (BME-HIT) Budapest, Hungary

ISSN 2191-5768 ISSN 2191-5776 (electronic) SpringerBriefs in Computer Science ISBN 978-3-319-98040-9 ISBN 978-3-319-98041-6 (eBook) https://doi.org/10.1007/978-3-319-98041-6 © The Author(s), under exclusive licence to Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, r