Software protection and simulation on oblivious RAMs

作者: Oded Goldreich , Rafail Ostrovsky

DOI: 10.1145/233551.233553

关键词:

摘要: Software protection is one of the most important issues concerning computer practice. There exist many heuristics and ad-hoc methods for protection, but problem as a whole has not received theoretical treatment it deserves. In this paper, we provide software protection. We reduce to efficient simulation on oblivious RAM.A machine if thhe sequence in which accesses memory locations equivalent any two inputs with same running time. For example, an Turing Machine movement heads tapes identical each computation. (Thus, independent actual input.) What slowdown time machine, required be oblivious? 1979, Pippenger Fischer showed how two-tape can simulate, on-line, one-tape Machine, logarithmic show analogous result random-access (RAM) model particular, do on-line arbitrary RAM by probabilistic polylogaithmic On other hand, that lower bound.

参考文章(24)
Miklós Ajtai, János Komlós, Endre Szemerédi, Halvers and Expanders foundations of computer science. pp. 686- 692 ,(1992)
S. Kent, PROTECTING EXTERNALLY SUPPLIED SOFTWARE IN SMALL COMPUTERS Massachusetts Institute of Technology. ,(1981)
Aho AV, JE Hopcroft, JD Ullman, The Design and Analysis of Computer Algorithms ,(1974)
Oded Goldreich, Rafail Ostrovsky, Comprehensive software protection system ,(1990)
Shafi Goldwasser, Silvio Micali, Charles Rackoff, The knowledge complexity of interactive proof systems SIAM Journal on Computing. ,vol. 18, pp. 186- 208 ,(1989) , 10.1137/0218012
Charles Rackoff, Daniel R. Simon, Cryptographic defense against traffic analysis Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93. pp. 672- 681 ,(1993) , 10.1145/167088.167260
Manuel Blum, Sampath Kannan, Designing programs that check their work Journal of the ACM. ,vol. 42, pp. 269- 291 ,(1995) , 10.1145/200836.200880
M. Blum, S. Kanna, Designing programs that check their work Proceedings of the twenty-first annual ACM symposium on Theory of computing - STOC '89. pp. 86- 97 ,(1989) , 10.1145/73007.73015
O. Goldreich, Towards a theory of software protection and simulation by oblivious RAMs symposium on the theory of computing. pp. 182- 194 ,(1987) , 10.1145/28395.28416
J. Håstad, Pseudo-random generators under uniform assumptions symposium on the theory of computing. pp. 395- 404 ,(1990) , 10.1145/100216.100270