2016
DOI: 10.1109/access.2016.2622724
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…The modifications are needed because, in the context of encrypted computing, conventional instruction sets have recently been shown by Rass and Schartner (2016) to be vulnerable to a 'chosen instruction' attack. That is, an attacker can generate an encrypted 1 by forcing encrypted division of any encrypted x by itself, then construct any encrypted K via encrypted self addition K -1 times over; then finally, branch on encrypted comparison with each K in turn allows any encrypted number to be deciphered.…”
Section: Recent Developmentsmentioning
confidence: 99%
“…The modifications are needed because, in the context of encrypted computing, conventional instruction sets have recently been shown by Rass and Schartner (2016) to be vulnerable to a 'chosen instruction' attack. That is, an attacker can generate an encrypted 1 by forcing encrypted division of any encrypted x by itself, then construct any encrypted K via encrypted self addition K -1 times over; then finally, branch on encrypted comparison with each K in turn allows any encrypted number to be deciphered.…”
Section: Recent Developmentsmentioning
confidence: 99%
“…The key idea to solve the problem mentioned above is to directly run encrypted instructions [3]. In other words, the client of the cloud service sends the encrypted instructions which represent the function to be evaluated and the encrypted inputs to the cloud sever.…”
Section: Introductionmentioning
confidence: 99%
“…on an encrypted z and subtracting on branch, z may be obtained efficiently bitwise. That is a chosen instruction attack (CIA) [21]. The instruction set has to resist such attacks, but the compiler must be involved too, else there would be known plaintext attacks (KPAs) [22] based on the idea that not only do instructions like x−x predictably favour one value over others (the result there is always x−x=0), but human programmers intrinsically use values like 0, 1 more often.…”
Section: Introductionmentioning
confidence: 99%