Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Cryptographic ObfuscationBootstrapping: From the Seed to the Flower

Cryptographic Obfuscation: Bootstrapping: From the Seed to the Flower [The key question that bootstrapping seeks to answer is the following: what is the simplest object that we can to transform into a general-purpose obfuscator using standard cryptographic assumptions?] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Cryptographic ObfuscationBootstrapping: From the Seed to the Flower

Loading next page...
 
/lp/springer-journals/cryptographic-obfuscation-bootstrapping-from-the-seed-to-the-flower-gNdXAoU3sy
Publisher
Springer International Publishing
Copyright
© The Author(s), under exclusive licence to Springer Nature Switzerland AG 2020
ISBN
978-3-319-98040-9
Pages
37 –53
DOI
10.1007/978-3-319-98041-6_4
Publisher site
See Chapter on Publisher Site

Abstract

[The key question that bootstrapping seeks to answer is the following: what is the simplest object that we can to transform into a general-purpose obfuscator using standard cryptographic assumptions?]

Published: Oct 6, 2020

There are no references for this article.