On the secure obfuscation of deterministic finite automata [report]

William Erik Anderson
2008 unpublished
In this paper, we show how to construct secure obfuscation for Deterministic Finite Automata, assuming non-uniformly strong one-way functions exist. We revisit the software protection approaches originally proposed by [5, 10, 12, 17] and revise them to the current obfuscation setting of Barak et al. [2] . Under this model, we introduce an efficient oracle that retains some "small" secret about the original program. Using this secret, we can construct an obfuscator and two-party protocol that
more » ... ty protocol that securely obfuscates Deterministic Finite Automata against malicious adversaries. The security of this model retains the strong "virtual black box" property originally proposed in [2] while incorporating the stronger condition of dependent auxiliary inputs in [15] . Additionally, we show that our techniques remain secure under concurrent self-composition with adaptive inputs and that Turing machines are obfuscatable under this model.
doi:10.2172/974399 fatcat:sxgtgejk6fauncxa5obzc6jur4