Secure Computation of MIPS Machine Code
نویسندگان
چکیده
Existing systems for secure computation require programmers to express the program to be securely computed as a circuit, or in some domain-specific language that can be compiled to a form suitable for applying known protocols. We propose a new system that can securely execute native MIPS code with no special annotations. Our system has the advantage of allowing programmers to use a language of their choice to express their programs, together with any off-the-shelf compiler to MIPS; it can be used for secure computation of existing “legacy” MIPS code as well. Our system uses oblivious RAM for fetching instructions and performing load/store operations in memory, and garbled universal circuits for the execution of a MIPS ALU in each instruction step. We also explore various optimizations based on an offline analysis of the MIPS code to be executed, in order to minimize the overhead of executing each instruction while still maintaining security.
منابع مشابه
MIPS code compression
MIPS machine code is very structured: registers used before are likely to be used again, some instructions and registers are used more heavily than others, some instructions often follow each other and so on. Standard file compression utilities, such as gzip and bzip2, does not take full advantage of the structure because they work on byte-boundaries and don’t see the underlying instruction fie...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملRain VM: Portable Concurrency through Managing Code
A long-running recent trend in computer programming is the growth in popularity of virtual machines. However, few have included good support for concurrency — a natural mechanism in the Rain programming language. This paper details the design and implementation of a secure virtual machine with support for concurrency, which enables portability of concurrent programs. Possible implementation ide...
متن کاملEfficient Resource Utilization in Virtual Cloud Computing Environment
Cloud computing is a platform that provides user to implement revolutionary technologies. The main phenomena of cloud computing is based on accessing the resources using remote computation. Task scheduling is one of the major area that should be focused on. In cloud environment there may be a condition where the resources are limited that may affect resource availability. This paper presents an...
متن کاملA Fully Encrypted Microprocessor The Secret Computer is Nearly Here
Following a sequence of hardware designs for a fully homomorphic crypto-processor – a general purpose processor that natively runs encrypted machine code on encrypted data in registers and memory, resulting in encrypted machine states – proposed by the authors in 2014, we discuss a working prototype of the first of those, a so-called ‘pseudo-homomorphic’ design. This processor is in principle s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015