Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation

被引:37
|
作者
Mood, Benjamin [1 ]
Gupta, Debayan [2 ]
Carter, Henry [3 ]
Butler, Kevin R. B. [1 ]
Traynor, Patrick [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
[2] Yale Univ, New Haven, CT 06520 USA
[3] Georgia Inst Technol, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/EuroSP.2016.20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent developments in secure computation have led to significant improvements in efficiency and functionality. These efforts created compilers that form the backbone of practical secure computation research. Unfortunately, many of the artifacts that are being used to demonstrate new research for secure computation are incomplete, incorrect, or unstable, leading to demonstrably erroneous results and inefficiencies - extending even to the most recently developed compiler systems. This is a problem because it hampers research and undermines feasibility tests when other researchers attempt to use these tools. We address these problems and present Frigate, a principled compiler and fast circuit interpreter for secure computation. To ensure correctness we apply best practices for compiler design and development, including the use of standard data structures, helpful negative results, and structured validation testing. Our systematic validation tests include checks on the internal compiler state, combinations of operators, and edge cases based on widely used techniques and errors we have observed in other work. This produces a compiler that builds correct circuits, is efficient and extensible. Frigate creates circuits with gate counts comparable to previous work, but does so with compile time speedups as high as 447x compared with the best results from previous work in circuit compilers. By creating a validated tool, our compiler will allow future secure computation implementations to be developed quickly and correctly.
引用
收藏
页码:112 / 127
页数:16
相关论文
共 50 条
  • [1] An Extensible, Optimizing Compiler for Secure Distributed Programs
    Acay, Cosku
    Recto, Rolph
    Gancher, Joshua
    Myers, Andrew C.
    Shi, Elaine
    PROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21), 2021, : 740 - 755
  • [2] An Extensible Framework for Efficient Secure SMS
    De Santis, Alfredo
    Castiglione, Aniello
    Cattaneo, Giuseppe
    Cembalo, Maurizio
    Petagna, Fabio
    Petrillo, Umberto Ferraro
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 843 - 850
  • [3] MAJOR: An efficient and extensible tool for mutation analysis in a Java compiler
    Department of Applied Information Processing, Ulm University, Germany
    不详
    IEEE/ACM Int. Conf. Autom. Softw. Eng., ASE, Proc., (612-615):
  • [4] DSCS: Towards An Extensible Secure Decentralised Distributed Computation Protocol
    Dalton, Alexander
    Thomas, David
    Cheung, Peter
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 658 - 663
  • [5] Efficient Secure Computation with Garbled Circuits
    Huang, Yan
    Shen, Chih-hao
    Evans, David
    Katz, Jonathan
    Shelat, Abhi
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 28 - +
  • [6] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [7] MetaData for efficient, secure and extensible access to data in a medical grid
    Pierson, JM
    Seitz, L
    Duque, H
    Montagnat, J
    15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 562 - 566
  • [8] Efficient Perfectly Secure Computation with Optimal Resilience
    Abraham, Ittai
    Asharov, Gilad
    Yanai, Avishay
    JOURNAL OF CRYPTOLOGY, 2022, 35 (04)
  • [9] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [10] Efficient Perfectly Secure Computation with Optimal Resiliencen
    Abraham, Ittai
    Asharov, Gilad
    Yanai, Avishay
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT II, 2021, 13043 : 66 - 96