Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security 2007
DOI: 10.1145/1255329.1255333
|View full text |Cite
|
Sign up to set email alerts
|

A domain-specific programming language for secure multiparty computation

Abstract: Creating tools with strong security guaranties which exploits the benefits obtained by combining confidential information without compromising it, is feasible and useful.In this progress report we document the research carried out so far to establish the feasibility of constructing useful tools which makes it possible to take advantage of secret information from multiple sources without revealing the information. We focus on the Secure Multiparty Computation Language (SMCL) a domain-specific language for Secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
36
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(36 citation statements)
references
References 59 publications
(85 reference statements)
0
36
0
Order By: Relevance
“…Several languages for programming secure computation systems have been proposed [21,25,15,32,22]. However, these language do not provide a clear separation of data with different policies on the type system level.…”
Section: Introductionmentioning
confidence: 99%
“…Several languages for programming secure computation systems have been proposed [21,25,15,32,22]. However, these language do not provide a clear separation of data with different policies on the type system level.…”
Section: Introductionmentioning
confidence: 99%
“…Generally they accept as input a program written in a Turingcomplete programming language, which can be either imperative [74,15,47,73,83,110,108,25,26,72] or descriptive [97]. The systems outputs can be boolean circuits [74,15,47], source code in a generic programming language [73,110,108,25,26,72], or a running protocol [97].…”
Section: Programming Toolsmentioning
confidence: 99%
“…The systems outputs can be boolean circuits [74,15,47], source code in a generic programming language [73,110,108,25,26,72], or a running protocol [97]. Some systems [74,15,47,97,73] employed cryptographic primitives to enable secure computation, whereas others [110,108,25,26,72,83] did not. Instead, they were designed as tools that use types or annotations to specify security properties and apply various static analysis techniques to ensure the security requirements are met.…”
Section: Programming Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…That is, by expressing their programs in a more natural manner and using automated analysis, optimisation and transformation, a programmer will improve their productivity, reduce their rate of error and generally produce software of a higher quality. Systems such as Cryptol [23], Sokrates [8], LaCodA [24] and SIMAP [29] have started to address this issue at various levels. Focusing on ECC based primitives, so that our domain is slightly orthogonal to previous work, we investigate three overarching topics: description of ECC based primitives in a natural manner using the CAO [30] language; automatic optimisation of those primitives using novel extensions to the CAO compiler; and the security implications of using specific forms of automation.…”
Section: Introductionmentioning
confidence: 99%