Taype: A Policy-Agnostic Language for Oblivious Computation
نویسندگان
چکیده
Secure multiparty computation (MPC) allows for joint over private data from multiple entities, usually backed by powerful cryptographic techniques that protect sensitive data. Several high-level programming languages have been proposed to make writing MPC applications accessible non-experts. These typically require developers enforce security policies within the logic of secure application itself, making it difficult update requirements, or experiment with different policies. This paper presents design and implementation Taype, a language permits concerns be decoupled program logic. To do so, Taype provides first oblivious algebraic types tape semantics, two features recently core calculus computation, λ OADT + . We evaluate our on range benchmarks, demonstrating its ability encode polices rich class types.
منابع مشابه
A Language for Probabilistically Oblivious Computation
An oblivious computation is one that is free of direct and indirect information leaks, e.g., due to observable differences in timing and memory access patterns. This paper presents Lobliv, a core language whose type system enforces obliviousness. Prior work on type-enforced oblivious computation has focused on deterministic programs. Lobliv is new in its consideration of programs that implement...
متن کاملObliv-C: A Language for Extensible Data-Oblivious Computation
Many techniques for secure or private execution depend on executing programs in a data-oblivious way, where the same instructions execute independent of the private inputs which are kept in encrypted form throughout the computation. Designers of such computations today must either put substantial effort into constructing a circuit representation of their algorithm, or use a high-level language ...
متن کاملLanguage Agnostic Dictionary Extraction
Ontologies are dynamic artifacts that evolve both in structure and content. Keeping them up-to-date is a very expensive and critical operation for any application relying on semantic Web technologies. In this paper we focus on evolving the content of an ontology by extracting relevant instances of ontological concepts from text. The novelty of this work is that we propose a technique which is (...
متن کاملPermuteRam: Optimizing Oblivious Computation for Efficiency
Privacy preserving computation is gaining importance. Along with secure computation guarantees, it is essential to hide information leakage through access patterns. Input-oblivious execution is a security property that is crucial to guarantee complete privacy preserving computation. In this work, we present an algorithm-specific approach to achieve input-oblivious execution. We call this class ...
متن کاملTowards Language-Agnostic Mobile Code
The Java Virtual Machine is primarily designed for transporting Java programs. As a consequence, when JVM bytecodes are used to transport programs in other languages, the result becomes less acceptable the more the source language diverges from Java. Microsoft’s .NET transport format fares better in this respect because it has a more flexible type system and instruction set, but it is not exten...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ACM on programming languages
سال: 2023
ISSN: ['2475-1421']
DOI: https://doi.org/10.1145/3591261