Obfuscation methods with controlled calculation amounts and table tunction

Yuan Yu Wei, Kazuo Ohzeki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

This paper describes a new obfuscarion method with two techniques by which both computational complexity can be controlled and semantic obfuscation can be achieved. The computational complexity can be strictly controlled by using the technique of encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime numbers by length from one second to about one year. Semantic obfuscation is achieved by transforming a function into a table function. A nonlinear, arbitrary function can be incorporated into the functions, while only linear functions are used in the conventional methods. Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, aucl the effect of integrated obfuscation with both techniques is great.

Original languageEnglish
Title of host publicationProceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010
Pages775-780
Number of pages6
Publication statusPublished - 2010 Dec 1
Event2010 International Multiconference on Computer Science and Information Technology, IMCSIT 2010 - Wisla, Poland
Duration: 2010 Oct 182010 Oct 20

Publication series

NameProceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010
Volume5

Conference

Conference2010 International Multiconference on Computer Science and Information Technology, IMCSIT 2010
Country/TerritoryPoland
CityWisla
Period10/10/1810/10/20

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems

Fingerprint

Dive into the research topics of 'Obfuscation methods with controlled calculation amounts and table tunction'. Together they form a unique fingerprint.

Cite this