A secure processor architecture for encrypted computation on untrusted programs
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted program, and the server computes on those encrypted inputs. To this end we propose a secure processor architecture, called Ascend, that guarantees privacy of data when arbitrary programs use the data...
Main Authors: | Dijk, Marten van, Devadas, Srinivas, Fletcher, Christopher Wardlaw |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | en_US |
Published: |
Association for Computing Machinery (ACM)
2015
|
Online Access: | http://hdl.handle.net/1721.1/99986 https://orcid.org/0000-0001-8253-7714 https://orcid.org/0000-0003-1467-2150 |
Similar Items
-
Towards an interpreter for efficient encrypted computation
by: Devadas, Srinivas, et al.
Published: (2014) -
Design space exploration and optimization of path oblivious RAM in secure processors
by: Ren, Ling, et al.
Published: (2014) -
Design and Implementation of the Ascend Secure Processor
by: Ren, Ling, et al.
Published: (2021) -
Offline Authentication of Untrusted Storage
by: Clarke, Dwaine, et al.
Published: (2023) -
Offline Integrity Checking of Untrusted Storage
by: Clarke, Dwaine, et al.
Published: (2023)