Publica
Hier finden Sie wissenschaftliche Publikationen aus den FraunhoferInstituten. Obfuscation combiners
 Robshaw, M. ; International Association for Cryptologic Research IACR: Advances in Cryptology  CRYPTO 2016. 36th Annual International Cryptology Conference. Pt.2 : Santa Barbara, CA, USA, August 1418, 2016; Proceedings Berlin: Springer, 2016 (Lecture Notes in Computer Science 9815) ISBN: 9783662530078 (Print) ISBN: 9783662530085 (Online) ISBN: 3662530074 pp.521550 
 International Cryptology Conference (CRYPTO) <36, 2016, Santa Barbara/Calif.> 

 English 
 Conference Paper 
 Fraunhofer SIT () 
Abstract
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side. This motivates us to study and present robust combiners for obfuscators, which integrate several candidate obfuscators into a single obfuscator which is secure as long as a quorum of the candidates is indeed secure. We give several results about building obfuscation combiners, with matching upper and lower bounds for the precise quorum of secure candidates. Namely, we show that one can build 3outof 4 obfuscation combiners where at least three of the four combiners are secure, whereas 2 outof3 structural combiners (which combine the obfuscator candidates in a blackbox sense) with only two secure candidates, are impossible. Our results generalize to (2γ+ 1)outof(3γ+ 1)combiners for the positive result, and to 2γoutof3γ results for the negative result, for any integer γ. To reduce overhead, we define detecting combiners , where the combined obfuscator may sometimes produce an errorindication instead of the desired output, indicating that some of the component obfuscators is faulty. We present a(γ+ 1)outof(2γ+ 1) detecting combiner for any integer γ, bypassing the previous lower bound. We further show that γoutof2γ structural detecting combiners are again impossible. Since our approach can be used for practical obfuscators, a s well as for obfuscators proven secure (based on assumptions), we also briefly report on implementation results for some applied obfuscator programs.