Conference paper
Hardness amplification of weakly verifiable puzzles
Ran Canetti, Shai Halevi, et al.
TCC 2005
Can we hide secrets in software? Can we obfuscate programs-that is, make programs unintelligible while preserving their functionality? What exactly do we mean by "unintelligible"? Why would we even want to do this? In this article, we describe some rigorous cryptographic answers to these quasi-philosophical questions. We also discuss our recent "candidate indistinguishability obfuscation" scheme and its implications.
Ran Canetti, Shai Halevi, et al.
TCC 2005
Martin Albrecht, Craig Gentry, et al.
CCS 2009
Craig Gentry, Shai Halevi
FOCS 2011
Craig Gentry, Allison Bishop Lewko, et al.
FOCS 2015