Show simple item record

dc.contributor.authorDevadas, Srinivas
dc.contributor.authorFletcher, Christopher Wardlaw
dc.contributor.authorVan Dijk, Marten
dc.date.accessioned2014-04-14T19:11:45Z
dc.date.available2014-04-14T19:11:45Z
dc.date.issued2012-10
dc.identifier.isbn9781450316651
dc.identifier.urihttp://hdl.handle.net/1721.1/86170
dc.description.abstractFully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs. Applying these techniques to general programs with recursive procedures and data-dependent loops has not been a focus of attention. In this paper, we take a first step toward building an interpreter that, given programs with complex control flow, schedules efficient code suitable for the application of FHE schemes. We first describe how programs written in a small Turing-complete instruction set can be executed with encrypted data and point out inefficiencies in this methodology. We then provide examples of scheduling (a) the greatest common divisor (GCD) problem using Euclid's algorithm and (b) the 3-Satisfiability (3SAT) problem using a recursive backtracking algorithm into path-levelized FHE computations. We describe how path levelization reduces control flow ambiguity and improves encrypted computation efficiency. Using these techniques and data-dependent loops as a starting point, we then build support for hierarchical programs made up of phases, where each phase corresponds to a fixed point computation that can be used to further improve the efficiency of encrypted computation. In our setting, the adversary learns an estimate of the number of steps required to complete the computation, which we show is the least amount of leakage possible.en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2381913.2381928en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleTowards an interpreter for efficient encrypted computationen_US
dc.typeArticleen_US
dc.identifier.citationChristopher W. Fletcher, Marten van Dijk, and Srinivas Devadas. 2012. Towards an interpreter for efficient encrypted computation. In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop (CCSW '12). ACM, New York, NY, USA, 83-94.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorFletcher, Christopher Wardlawen_US
dc.contributor.mitauthorVan Dijk, Martenen_US
dc.contributor.mitauthorDevadas, Srinivasen_US
dc.relation.journalProceedings of the 2012 ACM Workshop on Cloud computing security workshop (CCSW '12)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsFletcher, Christopher W.; Dijk, Marten van; Devadas, Srinivasen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-8253-7714
dc.identifier.orcidhttps://orcid.org/0000-0002-1224-0314
dc.identifier.orcidhttps://orcid.org/0000-0003-1467-2150
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record