Full accounting for verifiable outsourcing

RS Wahby, Y Ji, AJ Blumberg, A Shelat… - Proceedings of the …, 2017 - dl.acm.org
Systems for verifiable outsourcing incur costs for a prover, a verifier, and precomputation;
outsourcing makes sense when the combination of these costs is cheaper than not …

Raziel: Private and verifiable smart contracts on blockchains

DC Sánchez - ar** secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …

Automatically optimizing secure computation

F Kerschbaum - Proceedings of the 18th ACM conference on Computer …, 2011 - dl.acm.org
On the one hand, compilers for secure computation protocols, such as FairPlay or
FairPlayMP, have significantly simplified the development of such protocols. On the other …

Secure synthesis of distributed cryptographic applications

C Acay, J Gancher, R Recto, AC Myers - IEEE Computer Security …, 2024 - cs.cornell.edu
Develo** secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …

Language support for secure software development with enclaves

A Oak, AM Ahmadian, M Balliu… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
Confidential computing is a promising technology for securing code and data-in-use on
untrusted host machines, eg, the cloud. Many hardware vendors offer different …

Information flow control for distributed trusted execution environments

A Gollamudi, S Chong, O Arden - 2019 IEEE 32nd Computer …, 2019 - ieeexplore.ieee.org
Distributed applications cannot assume that their security policies will be enforced on
untrusted hosts. Trusted execution environments (TEEs) combined with cryptographic …