next up previous
Next: How to Play any Up: The Post-Doctoral Period (1983-86) Previous: Proofs that Yield Nothing

Towards a Theory of Software Protection and Simulation by Oblivious RAMs

The problem of hiding the memory-access sequence (of a protected CPU) is introduced and an efficient solution is provided. The heart of the solution is a randomized simulation of an arbitrary Random Access Machine (RAM) on an ``oblivious RAM'' (a randomized RAM in which the distribution of the memory-access sequence is independent of the actual input).


Comments: Authored by O. Goldreich. Appeared in



Oded Goldreich
2003-07-30