Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019
DOI: 10.1145/3321705.3329835
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Approach to Secure Function Evaluation using SGX

Abstract: A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function f of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes f and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractical for most real-time, online computations, particularly on modestly provisioned devices. Intel's Software Guard Extensi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 61 publications
(91 reference statements)
0
13
0
Order By: Relevance
“…(a) The threat model of Aramis is significantly stronger than the prior work on MPC using secure hardware [74], [69], [38], [11], [23], [29], [51], [32], [77], [83], [44]. Specifically, in our threat model, not only is the host operating system outside the Trusted Computing Base, but it is also allowed to observe the entire state of the hardware (including user data).…”
Section: Porthos (Section Iv)mentioning
confidence: 99%
“…(a) The threat model of Aramis is significantly stronger than the prior work on MPC using secure hardware [74], [69], [38], [11], [23], [29], [51], [32], [77], [83], [44]. Specifically, in our threat model, not only is the host operating system outside the Trusted Computing Base, but it is also allowed to observe the entire state of the hardware (including user data).…”
Section: Porthos (Section Iv)mentioning
confidence: 99%
“…Recent studies [1], [19], [25], [29], [30], [53], [59] tend to design data-oblivious systems to mitigate the memory access pattern leakage. Specifically, those systems adopt oblivious data structures (e.g., ORAM [63]) and algorithms to hide the access pattern on data as well as the code, which are the core sources exploited by the above attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A wide range of applications have been implemented via oblivious systems, such as file system [1], database [29], collaborative analytics [25], and indexing system [53], [59]. Recent works propose generic programming frameworks [19], [30] that can compile any algorithm as an oblivious circuit running in the enclave. However, all the above systems are not designed and optimised for network measurements.…”
Section: Related Workmentioning
confidence: 99%
“…There are, however, approaches that employ SGX for VC of a specific application domain. Specifically, the SGX scheme has been used to accelerate VC for smart contracts [69], machine learning [70], secure function evaluation [71], and MapReduce [72], [73]. Verifiable ASICs [74] employ a hardware circuit to verify the untrusted hardware modules.…”
Section: B Hardware Approachesmentioning
confidence: 99%