Indistinguishability Obfuscation from Well-Studied Assumptions

Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation has a firm mathematical foundation.

The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.

1147228353
Indistinguishability Obfuscation from Well-Studied Assumptions

Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation has a firm mathematical foundation.

The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.

54.95 In Stock
Indistinguishability Obfuscation from Well-Studied Assumptions

Indistinguishability Obfuscation from Well-Studied Assumptions

by Aayush Jain
Indistinguishability Obfuscation from Well-Studied Assumptions

Indistinguishability Obfuscation from Well-Studied Assumptions

by Aayush Jain

Paperback

$54.95 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation has a firm mathematical foundation.

The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.


Product Details

ISBN-13: 9798400713668
Publisher: Association for Computing Machinery
Publication date: 04/08/2025
Series: ACM Books
Pages: 134
Product dimensions: 7.50(w) x 9.25(h) x 0.29(d)

About the Author

Aayush Jain is an assistant professor in computer science at Carnegie Mellon University. He received his Ph.D. from UCLA under the supervision of Amit Sahai. Before that, he received his undergraduate degree from IIT Delhi. Aayush is interested in cryptography and its fascinating connections with areas of theoretical computer science. His current interests include the design of advanced cryptographic primitives such as obfuscation and homomorphic and functional encryption schemes. He's excited about expanding the scope of modern cryptography through the investigation of new sources of cryptography-friendly hard problems.
From the B&N Reads Blog

Customer Reviews