Difference between revisions of "Indistinguishability Obfuscation"

From MgmtWiki
Jump to: navigation, search
(Contexts)
(Contexts)
Line 4: Line 4:
  
 
==Contexts==
 
==Contexts==
First describe in 2018 a program at UCLA<ref>Erica Klarreich, ''Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography.'' Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/</ref> developed a technique considered prior to that to be impossible.
+
First described in 2018 a program at UCLA<ref>Erica Klarreich, ''Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography.'' Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/</ref> developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol.
  
 
==References==
 
==References==
  
 
[[Category: Cryptography]]
 
[[Category: Cryptography]]

Revision as of 06:48, 27 November 2021

Full Title or Meme

A process that enables a computer program to hide not just collections of data but the inner workings of itself.

Contexts

First described in 2018 a program at UCLA[1] developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol.

References

  1. Erica Klarreich, Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography. Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/