International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On the Secure Obfuscation of Deterministic Finite Automata

Authors:
W. Erik Anderson
Download:
URL: http://eprint.iacr.org/2008/184
Search ePrint
Search Google
Abstract: In this paper, we show how to construct secure obfuscation for Deterministic Finite Automata, assuming non-uniformly strong one-way functions exist. We revisit the software protection approaches originally proposed by [B79,G87,GO96,K80] and revise them to the current obfuscation setting of Barak et al. [BGI+01]. Under this model, we introduce an efficient oracle that retains some ``small" secret about the original program. Using this secret, we can construct an obfuscator and two-party protocol that securely obfuscates Deterministic Finite Automata against malicious adversaries. The security of this model retains the strong ``virtual black box" property originally proposed in [BGI+01] while incorporating the stronger condition of dependent auxiliary inputs in [GTK05]. Additionally, we further show that our techniques remain secure under concurrent self-composition with adaptive inputs and that Turing machines are obfuscatable under this model.
BibTeX
@misc{eprint-2008-17861,
  title={On the Secure Obfuscation of Deterministic Finite Automata},
  booktitle={IACR Eprint archive},
  keywords={foundations / Obfuscation, deterministic finite automata, state machines, Turing machines, authenticated encryption, oracle machines, provable security, game-playing.},
  url={http://eprint.iacr.org/2008/184},
  note={ weander@sandia.gov 14032 received 23 Apr 2008, last revised 2 Jun 2008},
  author={W. Erik Anderson},
  year=2008
}