can therefore expect some speed-up by this protocol and only in the worst case it will
deteriorate to the performance of the protocol without trusted computing.
6 Conclusion
The concept of language-based secure computation was introduced. The major chal-
lenge of securely translating the control-flow was exemplified with the secure if state-
ment protocol and the advantages of language-based secure computation have been
shown by an optimization on that protocol that requires the if statement to be trans-
lated directly. Many of the outlined challenges, e.g. comprehensive proofs and other
control-flow problems, such as for loops with secret bounds, remain to be solved and
are subject of future research.
References
1. J. Agat. Transforming out timing leaks. Proceedings of the ACM Symposium on Principles
of programming languages, 2000.
2. J. Agat, and D. Sands. On Confidentiality and Algorithms. Proceedings of the IEEE Sympo-
sium on Security and Privacy, 2001.
3. Z. Benenson, F. G
¨
artner, and D. Kesdogan. Secure Multi-Party Computation with Security
Modules. Proceedings of SICHERHEIT, 2005.
4. M. Ben-Or, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant
distributed computation. Proceedings of the 20th ACM symposium on theory of computing,
1988.
5. D. Brumley, and D. Boneh. Remote Timing Attacks Are Practical. Proceedings of the
USENIX security symposium, 2003.
6. D. Denning. A lattice model of secure information flow. Communications of the ACM 19(5),
1976.
7. C. Fournet, and A. Gordon. Stack Inspection: Theory and Variants. Proceedings of the 29th
ACM symposium on principles of programming languages, 2002.
8. O. Goldreich. Secure Multi-party Computation. Available at
www.wisdom.weizmann.ac.il/˜oded/pp.html, 2002.
9. S. Goldwasser. Multi party computations: past and present. Proceedings of the 16th ACM
symposium on principles of distributed computing, 1997.
10. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. Proceedings of
the 19th ACM conference on theory of computing, 1987.
11. O. Goldreich, and R. Ostrovsky. Software protection and simulation on oblivious RAMs.
Journal of the ACM, 1996.
12. J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, 1996.
13. P. Kocher. Timings attacks on implementations of Diffie–Hellman, RSA, DSS and other
systems. Proceedings of CRYPTO, 1996.
14. Y. Lindell, and B. Pinkas. Privacy Preserving Data Mining. Proceedings of CRYPTO, 2000.
15. D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - A Secure Two-party Computation
System. Proceedings of the USENIX security symposium, 2004.
16. A. Myers. JFlow: Practical Mostly-Static Information Flow Control. Proceedings of the ACM
Symposium on Principles of Programming Languages, 1999.
17. G. Necula, and P. Lee. Safe Kernel Extensions Without Run-Time Checking. Proceedings of
USENIX Symposium on Operating Systems Design and Implementation, 1996.
41