Secure Computation of MIPS Machine Code

@inproceedings{Wang2015SecureCO,
  title={Secure Computation of MIPS Machine Code},
  author={X. Wang and S. D. Gordon and Allen McIntosh and Jonathan Katz},
  booktitle={ESORICS},
  year={2015}
}
Existing systems for secure computation require programmers to express the program to be securely computed as a circuit, or in a domain-specific language that can be compiled to a form suitable for applying known protocols. We propose a new system that can securely execute native MIPS code with no special annotations. Our system allows programmers to use a language of their choice to express their programs, together with any off-the-shelf compiler to MIPS; it can be used for secure computation… Expand
26 Citations
Optimizing Secure Computation Programs with Private Conditionals
  • PDF
Efficient Maliciously Secure Multiparty Computation for RAM
  • 20
  • PDF
GarbledCPU: A MIPS processor for secure computation in hardware
  • 17
  • PDF
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning
  • 17
  • PDF
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation
  • 33
  • PDF
ARM2GC: Succinct Garbled Processor for Secure Computation
  • 6
  • Highly Influenced
  • PDF
ObliVM: A Programming Framework for Secure Computation
  • 236
  • Highly Influenced
  • PDF
ARM 2 GC : High-Level and Reliable Secure Computation Framework
  • 1
  • Highly Influenced
  • PDF
Techniques for scalable secure computation systems
  • 1
  • PDF
The Oblivious Machine - or: How to Put the C into MPC
  • 8
  • PDF
...
1
2
3
...

References

SHOWING 1-10 OF 36 REFERENCES
Secure two-party computations in ANSI C
  • 125
  • Highly Influential
  • PDF
Obliv-C: A Language for Extensible Data-Oblivious Computation
  • 127
  • PDF
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation
  • 112
  • PDF
Automating Efficient RAM-Model Secure Computation
  • 97
  • PDF
PICCO: a general-purpose compiler for private distributed computation
  • 88
  • PDF
SCAPI: The Secure Computation Application Programming Interface
  • 65
  • PDF
TASTY: tool for automating secure two-party computations
  • 364
  • PDF
ObliVM: A Programming Framework for Secure Computation
  • 236
  • PDF
The Oblivious Machine - or: How to Put the C into MPC
  • 8
  • PDF
...
1
2
3
4
...