Difference between revisions of "Indistinguishability Obfuscation"
From MgmtWiki
(→Contexts) |
(→Contexts) |
||
Line 4: | Line 4: | ||
==Contexts== | ==Contexts== | ||
− | First | + | First described in 2018 a program at UCLA<ref>Erica Klarreich, ''Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography.'' Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/</ref> developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol. |
==References== | ==References== | ||
[[Category: Cryptography]] | [[Category: Cryptography]] |
Revision as of 07:48, 27 November 2021
Full Title or Meme
A process that enables a computer program to hide not just collections of data but the inner workings of itself.
Contexts
First described in 2018 a program at UCLA[1] developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol.
References
- ↑ Erica Klarreich, Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography. Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/