PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems. The techniques are applied to symmetric key crypto-system and the target system is asymmetric one. As an input for our approach an implementation of symmetric block cipher with a given private-key is considered. Different obfuscation methods are subjected to processing. The target system would be treated as a public-key for newly created public crypto-system. The approach seems to be interesting from theoretical point of view. Moreover, it can be useful for information protection in a cloud-computing model.
Twórcy
autor
  • Warsaw University of Technology, Poland
  • Warsaw University of Technology, Poland
  • Military University of Technology in Warsaw, Poland
autor
  • Warsaw University of Technology, Poland
Bibliografia
  • [1] D. Apon, Y. Huang, J.Katz and A. Malozemoff, ”Implementing cryptographic program obfusctaion”, Cryptology ePrint Archive, 2014.
  • [2] B. Barak, O. Goldreich, R.Impagliazzo, S.Rudich, A.Sahai, S. Vadhan and K.Yang, ”On the (im)possibility of obfuscating programs”, Advences in Cryptology - EUROCRYPT 2011, 2011.
  • [3] G. Boole, ”An investigation of the laws of thought: On which are founded the mathematical theories of logic and probabilities”, 1854.
  • [4] J-S. Coron, T. Lepoint and M. Tibouchu, ”Practical multilinear maps over the integers”, Advances in Cryptology - CRYPTO 2013, vol. 1, 8042, pp. 476-493, 2013.
  • [5] J-S. Coron, T. Lepoint and M. Tibouchu, ”New multilinear maps over the integers”, Cryptology ePrint Archive, Report 2015/162, 2015.
  • [6] C. Gentry, ”A fully homomorphic encryption scheme”, PhD thesis, Stanford University, 2009.
  • [7] S. Garg, C. Gentry and S. Halevi, ”Candidate multilinear maps from ideal lattices”, Advences in Cryptology - EUROCRYPT 2013, 2013, 7881 of Lecture Notes in Computer Science pp. 1-17].
  • [8] C. Gentry, S. Gorbunov, and S. Halevi, ”Graph-induced multilinear mapsfrom lattices”, TCC 2015, Part II, volume 9015 of LNCS, pp. 498-527. Springer, 2015.
  • [9] A. Malozemoff, Implementation of program obfuscation published on github: https://github.com/amaloz/obfuscation. Accesed: 2017-09-20.
  • [10] A. Sahai and M. Zhandry, ”Obfuscating low-rank matrix branching programs”, Cryptology ePrint Archive, Report 2014/772, 2014.
  • [11] Stunnix - a tool designed for obfuscation of C/C++ programs. http://stunnix.com/prod/cxxo. Accesed: 2018-01-20.
  • [12] Zelix KlassMaster - a tool designed for obfuscation of JAVA programs. http://stunnix.com/prod/cxxo. Accesed: 2018-01-20.
  • [13] Opy - a tool designed for obfuscation of PYTHON programs. https://github.com/QQuick/Opy. Accesed: 2018-01-20.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-33f3eebc-66ff-446f-a6b9-7b438ee9adff
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.