On Obfuscating Compilation for Encrypted Computing

Peter T. Breuer, Jonathan Bowen, Esther Palomar, Zhiming Liu

Abstract

This paper investigates conditions for privacy and security of data against the privileged operator on processors that ‘work encrypted’. A compliant machine code architecture plus an ‘obfuscating’ compiler turns out to be both necessary and sufficient to achieve that, the combination mathematically assuring the privacy of user data in arbitrary computations in an encrypted computing context.

Download


Paper Citation


in Harvard Style

Breuer P., Bowen J., Palomar E. and Liu Z. (2017). On Obfuscating Compilation for Encrypted Computing . In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 247-254. DOI: 10.5220/0006394002470254


in Bibtex Style

@conference{secrypt17,
author={Peter T. Breuer and Jonathan Bowen and Esther Palomar and Zhiming Liu},
title={On Obfuscating Compilation for Encrypted Computing},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)},
year={2017},
pages={247-254},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006394002470254},
isbn={978-989-758-259-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)
TI - On Obfuscating Compilation for Encrypted Computing
SN - 978-989-758-259-2
AU - Breuer P.
AU - Bowen J.
AU - Palomar E.
AU - Liu Z.
PY - 2017
SP - 247
EP - 254
DO - 10.5220/0006394002470254