Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

On the secure obfuscation of deterministic finite automata.

Technical Report ·
DOI:https://doi.org/10.2172/974399· OSTI ID:974399

In this paper, we show how to construct secure obfuscation for Deterministic Finite Automata, assuming non-uniformly strong one-way functions exist. We revisit the software protection approaches originally proposed by [5, 10, 12, 17] and revise them to the current obfuscation setting of Barak et al. [2]. Under this model, we introduce an efficient oracle that retains some 'small' secret about the original program. Using this secret, we can construct an obfuscator and two-party protocol that securely obfuscates Deterministic Finite Automata against malicious adversaries. The security of this model retains the strong 'virtual black box' property originally proposed in [2] while incorporating the stronger condition of dependent auxiliary inputs in [15]. Additionally, we show that our techniques remain secure under concurrent self-composition with adaptive inputs and that Turing machines are obfuscatable under this model.

Research Organization:
Sandia National Laboratories
Sponsoring Organization:
USDOE
DOE Contract Number:
AC04-94AL85000
OSTI ID:
974399
Report Number(s):
SAND2008-3626
Country of Publication:
United States
Language:
English

Similar Records

A flexible framework for secure and efficient program obfuscation.
Technical Report · Thu Feb 28 23:00:00 EST 2013 · OSTI ID:1096167

Privacy-Preserving Average Consensus With Beaver Triple and Communication Obfuscation
Journal Article · Wed Feb 05 23:00:00 EST 2025 · IEEE Transactions on Automatic Control · OSTI ID:2587501

Automata theory. 1964-May 1983 (Citations from the NTIS Data Base)
Technical Report · Wed Jun 01 00:00:00 EDT 1983 · OSTI ID:6755118