ObliVM: A Programming Framework for Secure Computation

作者: Chang Liu , Xiao Shaun Wang , Kartik Nayak , Yan Huang , Elaine Shi

DOI: 10.1109/SP.2015.29

关键词:

摘要: We design and develop Obli VM, a programming framework for secure computation. ObliVM offers domain specific language designed compilation of programs into efficient oblivious representations suitable powerful, expressive user-friendly abstractions. various showcase applications such as data mining, streaming algorithms, graph genomic analysis, structures, demonstrate the scalability to bigger sizes. also show how significantly reduces development effort while retaining competitive performance wide range in comparison with hand-crafted solutions. are process open-sourcing our rich libraries community (www.oblivm.com), offering reusable implement distribute new cryptographic algorithms.

参考文章(57)
Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen, Billion-gate secure computation with malicious adversaries usenix security symposium. pp. 14- 14 ,(2012)
Pavel Pudlák, The Complexity of Computations Springer, Heidelberg. pp. 365- 493 ,(2013) , 10.1007/978-3-319-00119-7_5
Eyal Kushilevitz, Rafail Ostrovsky, Steve Lu, On the (in)security of hash-based oblivious RAM and a new balancing scheme symposium on discrete algorithms. pp. 143- 156 ,(2012) , 10.5555/2095116.2095129
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou, On the security of the Free-XOR technique theory of cryptography conference. ,vol. 7194, pp. 39- 53 ,(2012) , 10.1007/978-3-642-28914-9_3
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay—a secure two-party computation system usenix security symposium. pp. 20- 20 ,(2004)
Robert Tibshirani, Trevor Hastie, Jerome H. Friedman, The Elements of Statistical Learning ,(2001)
Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations european symposium on research in computer security. pp. 192- 206 ,(2008) , 10.1007/978-3-540-88313-5_13
Michael T. Goodrich, Joseph A. Simons, Data-Oblivious Graph Algorithms in Outsourced External Memory conference on combinatorial optimization and applications. pp. 241- 257 ,(2014) , 10.1007/978-3-319-12691-3_19
Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar, TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits 2015 IEEE Symposium on Security and Privacy. pp. 411- 428 ,(2015) , 10.1109/SP.2015.32