{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:43:53Z","timestamp":1725615833338},"reference-count":25,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2016,4,26]],"date-time":"2016-04-26T00:00:00Z","timestamp":1461628800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2016,4,26]]},"abstract":"\n Can we hide secrets in software? Can we obfuscate programs---that is, make programs\n unintelligible<\/jats:italic>\n while preserving their functionality? What exactly do we mean by \"unintelligible\"? Why would we even want to do this?\n <\/jats:p>\n In this article, we describe some rigorous cryptographic answers to these quasi-philosophical questions. We also discuss our recent \"candidate indistinguishability obfuscation\" scheme and its implications.<\/jats:p>","DOI":"10.1145\/2902313","type":"journal-article","created":{"date-parts":[[2016,4,27]],"date-time":"2016-04-27T12:10:51Z","timestamp":1461759051000},"page":"113-120","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Hiding secrets in software"],"prefix":"10.1145","volume":"59","author":[{"given":"Sanjam","family":"Garg","sequence":"first","affiliation":[{"name":"UC Berkeley, Berkeley, CA"}]},{"given":"Craig","family":"Gentry","sequence":"additional","affiliation":[{"name":"IBM TJ Watson Research Center, Yorktown Heights, NY"}]},{"given":"Shai","family":"Halevi","sequence":"additional","affiliation":[{"name":"IBM TJ Watson Research Center, Yorktown Heights, NY"}]},{"given":"Mariana","family":"Raykova","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA"}]},{"given":"Amit","family":"Sahai","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, CA"}]},{"given":"Brent","family":"Waters","sequence":"additional","affiliation":[{"name":"UT Austin, Austin, TX"}]}],"member":"320","published-online":{"date-parts":[[2016,4,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704152"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12131"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987260.1987281"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554799"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1594894"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705058"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488667"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_20"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.60"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760749.1760765"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716861"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62215"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"e_1_2_1_23_1","volume-title":"Foundations of Secure Computation","author":"Rivest R.","year":"1978","unstructured":"Rivest , R. , Adleman , L. , Dertouzos , M.L. On data banks and privacy homomorphisms . In Foundations of Secure Computation ( 1978 ), 169--180. Rivest, R., Adleman, L., Dertouzos, M.L. On data banks and privacy homomorphisms. In Foundations of Secure Computation (1978), 169--180."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796535"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591825"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2902313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,3]],"date-time":"2023-12-03T11:19:02Z","timestamp":1701602342000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2902313"}},"subtitle":["a cryptographic approach to program obfuscation"],"short-title":[],"issued":{"date-parts":[[2016,4,26]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,4,26]]}},"alternative-id":["10.1145\/2902313"],"URL":"https:\/\/doi.org\/10.1145\/2902313","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,26]]},"assertion":[{"value":"2016-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}