Applications of Obfuscation

Lecture 1: Applications of Obfuscation I
Lecture 2: Applications of Obfuscation II

This series of talks was part of the Cryptography Boot Camp. Videos for each talk area available through the links above.

Speaker: Craig Gentry, IBM T.J. Watson Research Center

The notion of indistinguishability obfuscation (iO) is less intuitive and trickier to use than black box obfuscation, but it has turned out to be surprisingly powerful, allowing us in many cases to hide secrets in software. We survey some of the many applications of iO (functional encryption, witness encryption, building public-key encryption schemes from private-key ones, and others) and describe some of the tricks used in the proofs of these constructions (e.g., playing shell games with secrets and punctured programs). We may also touch upon applications of related notions, such as differing inputs obfuscation.