Filters








33 Hits in 4.3 sec

An Offline Delegatable Cryptocurrency System [article]

Rujia Li and Qin Wang and Xinrui Zhang and Qi Wang and David Galindo and Yang Xiang
2021 arXiv   pre-print
However, in such an approach, the coins that have been delegated confront the risk of being spent twice since the delegator's behaviour cannot be restricted easily on account of the absence of effective  ...  In DelegaCoin, an owner can delegate his coins through offline-transactions without interacting with the blockchain network.  ...  Then, we build an adversary A against IND-CPA secure of SE.Given a transaction Tx , if A distinguishes the encryption of r from the encryption of 1 |r| , we forward the corresponding answer to the IND-CPA  ... 
arXiv:2103.12905v1 fatcat:7pqkzsgjpfburpwb2xxz5rc4re

EnclaveDB: A Secure Database Using SGX

Christian Priebe, Kapil Vaswani, Manuel Costa
2018 2018 IEEE Symposium on Security and Privacy (SP)  
A key component of EnclaveDB is an efficient protocol for checking integrity and freshness of the database log.  ...  EnclaveDB has a small trusted computing base, which includes an in-memory storage and query engine, a transaction manager and pre-compiled stored procedures.  ...  Developers can reserve a part of enclave memory for an array of thread control structures (TCS).  ... 
doi:10.1109/sp.2018.00025 dblp:conf/sp/PriebeVC18 fatcat:bc7ng55eizdllkkiz5oytz46aq

HardIDX: Practical and Secure Index with SGX [article]

Benny Fuhry, Florian Hahn Technische Universität Darmstadt
2017 arXiv   pre-print
In this paper we present HardIDX: a hardware-based approach, leveraging Intel's SGX, for search over encrypted data.  ...  Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance.  ...  Other components would occupy large regions of the restricted enclave memory and thus further limit the available space.  ... 
arXiv:1703.04583v1 fatcat:cg6duzwksvb3jgvzrt76h5wmk4

Characterization of Fixed and Reconfigurable Multi-Core Devices for Application Acceleration

Jason Williams, Chris Massie, Alan D. George, Justin Richardson, Kunal Gosrani, Herman Lam
2010 ACM Transactions on Reconfigurable Technology and Systems  
As more, disparate devices enter the market, there is an increasing need for concepts, terminology, and classification techniques to understand the device tradeoffs.  ...  This article presents a hierarchical taxonomy of computing devices, concepts and terminology describing reconfigurability, and computational density and internal memory bandwidth metrics to compare devices  ...  ACKNOWLEDGMENTS The authors gratefully acknowledge vendor equipment and/or tools provided by Altera, Mathstar, and Xlinx, as well as an MS graduate from our group, Sidarth Suresh, for his assistance with  ... 
doi:10.1145/1862648.1862649 fatcat:iinoh7oigjhttciul6yxlakg5y

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations.  ...  Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable.  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051)

Kristin Lauter, Radu Sion, Nigel P. Smart, Marc Herbstritt
2016 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 16051 "Modern Cryptography and Security: An Inter-Community Dialogue".  ...  MPC: killer applications and threat models for applications  ...  Memory access pattern might also leak information about the internal state of a SGX enclave. A malicious OS could observe all memory access of an enclave at page granularity.  ... 
doi:10.4230/dagrep.6.1.207 dblp:journals/dagstuhl-reports/LauterSS16 fatcat:pvygznzfp5bpbhzl5jirtvtnpm

Improving FPGA Performance for Carry-Save Arithmetic

Hadi Parandeh-Afshar, Ajay Kumar Verma, Philip Brisk, Paolo Ienne
2010 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
To address this concern, we introduce the "field programmable counter array" (FPCA), an accelerator for carry-save arithmetic intended for integration into an FPGA as an alternative to DSP blocks.  ...  The selective use of carry-save arithmetic, where appropriate, can accelerate a variety of arithmetic-dominated circuits.  ...  Restrictions apply.  ... 
doi:10.1109/tvlsi.2009.2014380 fatcat:hb7laxavs5b3zmlvrxcsnb4eja

Soft MOUSETRAP: A Bundled-Data Asynchronous Pipeline Scheme Tolerant to Random Variations at Ultra-Low Supply Voltages

Jian Liu, Steven M. Nowick, Mingoo Seok
2013 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems  
A post-layout evaluation of the new switch design, in comparison with the synchronous xpipesLite implementation, demonstrated: a reduction in overall power of 85%/73% (vs. synchronous without/with clock  ...  There is also a recent surge of interest in industry in hybrid designs, which connect standard synchronous components (e.g. processors, memories) through flexible asynchronous interconnection networks,  ...  to evaluate a system's operation and also as a basis for driving further optimization.  ... 
doi:10.1109/async.2013.29 dblp:conf/async/LiuNS13 fatcat:pgi4on5mbffj3fylrygmhghspy

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection [article]

Florian Kerschbaum and Erik-Oliver Blass and Rasoul Akhavan Mahdavi
2022 arXiv   pre-print
A useful property of our comparison protocol is that it can be divided into an online and an offline phase.  ...  This leads to an incredibly fast online phase, and our evaluation shows that it outperforms related work, including KKRT (CCS 16), VOLE-PSI (EuroCrypt 21), and OKVS (Crypto 21).  ...  ACKNOWLEDGEMENTS We gratefully acknowledge the support of NSERC for grants RGPIN-05849, IRC-537591, and the Royal Bank of Canada for funding this research.  ... 
arXiv:2209.13913v1 fatcat:cgzuctrw4jg3hhlxveflfi3owu

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution [article]

Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, Dawn Song
2019 arXiv   pre-print
Today they manage billions of dollars in value and motivate visionary plans for pervasive blockchain deployment.  ...  For example, in naive designs, privacy in TEE-backed contracts can be jeopardized by forgery of blocks, a seemingly unrelated attack vector.  ...  ACKNOWLEDGMENTS We wish to thank Intel, and Mic Bowman in particular, for ongoing research discussions and generous support of a number of aspects of this work.  ... 
arXiv:1804.05141v6 fatcat:r3y3kq7g6jda7ag3hznfrcw45a

IRON

Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
We build Iron, a practical and usable FE system using Intel's recent Software Guard Extensions (SGX).  ...  Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an authorized entity compute on encrypted data, and learn the results in the clear.  ...  denote an IND-CPA secure secret key encryption scheme (Definition 6.5).  ... 
doi:10.1145/3133956.3134106 dblp:conf/ccs/FischVBG17 fatcat:mr25zv2g7baalmzal72mrkhslq

MB++: An Integrated Architecture for Pervasive Computing and High-Performance Computing

David J. Lillethun, David Hilley, Seth Horrigan, Umakishore Ramachandran
2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007)  
MB++ is a system that caters to the dynamic needs of applications in a distributed, pervasive computing environment that has a wide variety of devices that act as producers and consumers of stream data  ...  Further, we show that our implementation can exploit opportunities for parallelism in dataflow graphs, as well as efficiently sharing common subgraphs between dataflow graphs.  ...  implementation of the MB++ architecture and experimental evaluation of its capabilities.  ... 
doi:10.1109/rtcsa.2007.47 dblp:conf/rtcsa/LillethunHHR07 fatcat:oyjfedl4xneftj7gd7aziw3cnq

Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security

Wenye Liu, Chip-Hong Chang, Xueyang Wang, Chen Liu, Jason Fung, Mohammad Ebrahimabadi, Naghmeh Karimi, Xingyu Meng, Kanad Basu
2021 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
We will discuss the possible future research directions, and thereby, sharing a roadmap for the hardware security community in general.  ...  The inability to fully understand and explain what has been done within the super-intelligence can turn an inherently benevolent system into malevolent.  ...  Memory timing side-channel attack on GPU can be mitigated by randomizing the width of the coalescing unit and merging transactions across different warps [211] .  ... 
doi:10.1109/jetcas.2021.3084400 fatcat:c4wdkghpo5fwbhvkekaysnahzm

Execution Models [chapter]

2006 Service-Oriented Computing  
(CPAs).  ...  A property restriction acts as the constructor for a class, namely, the class of individuals that satisfy the given restriction.  ...  Guidelines for OWL The OWL syntax allows malformed restrictions and multiple ways to capture the same meaning. • A restriction that lacks an owl:onProperty element would have no semantic effect, although  ... 
doi:10.1002/0470091509.ch10 fatcat:2jdemglma5gtre5xkxtzck45am

Bluetooth Hacking: A Case Study

Dennis Browning, Gary Kessler
2009 Journal of Digital Forensics, Security and Law  
ACKNOWLEDGEMENTS The authors would like to acknowledge "Higher Education Authority" (HEA) and "Irish Research Council for Science, Engineering and Technology" for providing funding that made this research  ...  ACKNOWLEDGEMENTS The authors would like to acknowledge "Higher Education Authority" (HEA) and "Irish Research Council for Science, Engineering and Technology" for providing funding that made this research  ...  platters into memory ready for execution.  ... 
doi:10.15394/jdfsl.2009.1058 fatcat:cm7mvnadpzdthhitft5boixn5i
« Previous Showing results 1 — 15 out of 33 results