Nonmalleable digital lockers and robust fuzzy extractors in the plain model

D Apon, C Cachet, B Fuller, P Hall, FH Liu - International Conference on …, 2022 - Springer
We give the first constructions in the plain model of 1) nonmalleable digital lockers (Canetti
and Varia, TCC 2009) and 2) robust fuzzy extractors (Boyen et al., Eurocrypt 2005) that …

Implementing conjunction obfuscation under entropic ring LWE

DB Cousins, G Di Crescenzo, KD Gür… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We address the practicality challenges of secure program obfuscation by implementing,
optimizing, and experimentally assessing an approach to securely obfuscate conjunction …

Innovation corps for learning: Evidence-based entrepreneurship™ to improve (STEM) education

RCC Guerra, KA Smith, AF McKenna… - 2014 IEEE frontiers …, 2014 - ieeexplore.ieee.org
The Innovation Corps for Learning (I-Corps-L) is a pilot initiative from the National Science
Foundation (NSF) and the American Society for Engineering Education (ASEE) to study …

Boolean circuit camouflage: Cryptographic models, limitations, provable results and a random oracle realization

G Di Crescenzo, J Rajendran, R Karri… - Proceedings of the 2017 …, 2017 - dl.acm.org
Recent hardware advances, called gate camouflaging, have opened the possibility of
protecting integrated circuits against reverse-engineering attacks. In this paper, we …

Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks

G Di Crescenzo, L Bahler… - 2020 IEEE Conference on …, 2020 - ieeexplore.ieee.org
We consider the problem of protecting cloud services from simultaneous white-box and
black-box attacks. Recent research in cryptographic program obfuscation considers the …

Cryptographic formula obfuscation

G Di Crescenzo - International Symposium on Foundations and Practice …, 2018 - Springer
Under intractability assumptions commonly used in cryptography, we show an efficient
program obfuscator for large classes of programs, including any arbitrary monotone formula …

Cryptographic program obfuscation: Practical solutions and application-driven models

GD Crescenzo - Versatile Cybersecurity, 2018 - Springer
Program obfuscation is about modifying source or machine code into functionally equivalent
code that is hard to understand to a human or some other program. Early obfuscation …

Intrusion-resilient classifier approximation: from wildcard matching to range membership

G Di Crescenzo, L Bahler, B Coan… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
We study the problem of securing machine learning classifiers against intrusion attacks (ie,
attacks that somehow retrieve the classifier model parameters). We show that efficient …

Implementing token-based obfuscation under (ring) LWE

C Chen, N Genise, D Micciancio, Y Polyakov… - Cryptology ePrint …, 2018 - eprint.iacr.org
Token-based obfuscation (TBO) is an interactive approach to cryptographic program
obfuscation that was proposed by Goldwasser et al.(STOC 2013) as a potentially more …

Cryptographic password obfuscation

G Di Crescenzo, L Bahler, B Coan - International Conference on …, 2018 - Springer
We consider cryptographic program obfuscation of point functions (ie, functions
parameterized by a secret s that, on input a string x, return 1 if x= s and 0 otherwise). We …