Automating Efficient RAM-Model Secure Computation

被引:41
|
作者
Liu, Chang [1 ]
Huang, Yan [1 ]
Shi, Elaine [1 ]
Katz, Jonathan [1 ]
Hicks, Michael [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
关键词
D O I
10.1109/SP.2014.46
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RAM-model secure computation addresses the inherent limitations of circuit-model secure computation considered in almost all previous work. Here, we describe the first automated approach for RAM-model secure computation in the semi honest model. We define an intermediate representation called SCVM and a corresponding type system suited for RAM-model secure computation. Leveraging compile-time optimizations, our approach achieves order-of-magnitude speedups compared to both circuit-model secure computation and the state-of-art RAM model secure computation.
引用
收藏
页码:623 / 638
页数:16
相关论文
共 50 条
  • [1] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [2] SCORAM: Oblivious RAM for Secure Computation
    Wang, Xiao Shaun
    Huang, Yan
    Chan, T-H Hubert
    Shelat, Abhi
    Shi, Elaine
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 191 - 202
  • [3] Adaptively Secure Computation for RAM Programs
    Bangalore, Laasya
    Ostrovsky, Rafail
    Poburinnaya, Oxana
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 187 - 216
  • [4] A Scripting Language for Automating Secure Multiparty Computation
    Chen, Kung
    Hsu, Tsan-sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 127 - 134
  • [5] Towards Practical RAM Based Secure Computation
    Buescher, Niklas
    Weber, Alina
    Katzenbeisser, Stefan
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 416 - 437
  • [6] Secure Multiparty RAM Computation in Constant Rounds
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Pandey, Omkant
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
  • [7] Gradual GRAM and secure computation for RAM programs
    Hazay, Carmit
    Lilintal, Mor
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (01) : 197 - 229
  • [8] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Carmit Hazay
    Avishay Yanai
    Journal of Cryptology, 2019, 32 : 1144 - 1199
  • [9] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Hazay, Carmit
    Yanai, Avishay
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1144 - 1199
  • [10] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Hazay, Carmit
    Yanai, Avishay
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553