able at run-time depending on the value it contains.
Using subdomain privacy confidentiality of data can
be defined on a more fine-grained level, which we be-
lieve is an important step to making computation on
encrypted data feasible for a large range of applica-
tions.
REFERENCES
Beaver, D. (1992). Efficient multiparty protocols using
circuit randomization. In Advances in Cryptology
(CRYPTO), pages 420–432.
Bindschaedler, V., Naveed, M., Pan, X., Wang, X., and
Huang, Y. (2015). Practicing oblivious access on
cloud storage: the gap, the fallacy, and the new way
forward. In Proc. of the 22nd ACM SIGSAC Conf. on
Computer and Communications Security, pages 837–
849.
Bogdanov, D., Laud, P., and Randmets, J. (2014). Domain-
Polymorphic Programming of Privacy-Preserving Ap-
plications. In Proc. 9th ACM SIGPLAN Workshop
on Programming Languages and Analysis for Security
(PLAS), pages 53–65.
Clark, D., Hunt, S., and Malacaria, P. (2005). Quantitative
Information Flow, Relations and Polymorphic Types.
Journal of Logic and Computation, 18(2):181–199.
Clarkson, M. R., Myers, A. C., and Schneider, F. B.
(2009). Quantifying Information Flow with Beliefs.
17(5):655–701.
Demmler, D., Schneider, T., and Zohner, M. (2015). ABY
– A Framework for Efficient Mixed-Protocol Secure
Two-Party Computation. In Proc. Network and Dis-
tributed System Security (NDSS).
Goguen, J. and Meseguer, J. (1982). Security policies and
security models. In Security and Privacy, 1982 IEEE
Symposium on, pages 11–11.
Goldreich, O., Micali, S., and Wigderson, A. (1987). How
to play any mental game. In Proc. of 19th Symp. on
Theory of computing, pages 218–229.
Goldreich, O. and Ostrovsky, R. (1996). Software protec-
tion and simulation on oblivious rams. Journal of the
ACM (JACM), 43(3):431–473.
Hacıg¨um¨us¸, H., Hore, B., Iyer, B., and Mehrotra, S. (2007).
Search on Encrypted Data. In Secure Data Manage-
ment in Decentralized Systems, pages 383–425.
Holzer, A., Franz, M., Katzenbeisser, S., and Veith, H.
(2012). Secure two-party computations in ansi c. In
Proceedings of the 2012 ACM conference on Com-
puter and communications security, pages 772–783.
ACM.
Kerschbaum, F., Schneider, T., and Schr¨opfer, A. (2014).
Automatic Protocol Selection in Secure Two-Party
Computations. In Applied Cryptography and Network
Security, pages 566–584. Springer.
Laud, P. and Randmets, J. (2015). A domain-specific lan-
guage for low-level secure multiparty computation
protocols. In Proc. of the 22Nd ACM SIGSAC Con-
ference on Computer and Communications Security,
pages 1492–1503.
Paillier, P. (1999). Public-Key Cryptosystems Based on
Composite Degree Residuosity Classes. In Advances
in Cryptology–EUROCRYPT’99, pages 223–238.
Popa, R. A., Redfield, C., Zeldovich, N., and Balakrish-
nan, H. (2011). CryptDB Protecting Confidentiality
with Encrypted Query Processing. In Proc. 23rd ACM
Symposium on Operating Systems Principles (SOSP),
pages 85–100.
Rastogi, A., Hammer, M. A., and Hicks, M. (2014). Wys-
teria: A programming language for generic, mixed-
mode multiparty computations. In Security and Pri-
vacy (SP), 2014 IEEE Symposium on, pages 655–670.
IEEE.
Sabelfeld, A. and Myers, A. C. (2003). Language-based
information-flow security. IEEE Journal on Selected
Areas in Communications, 21(1):5–19.
Schneider, J. (2016). Lean and fast secure multi-party com-
putation: Minimizing communication and local com-
putation using a helper. 13th Int. Conf. on Security
and Cryptography(SECRYPT).
Stefanov, E., Van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu,
X., and Devadas, S. (2013). Path oram: An extremely
simple oblivious ram protocol. In Proc. of the SIGSAC
conference on Computer & communications security,
pages 299–310.
Tople, S., Shinde, S., Chen, Z., and Saxena, P. (2013). AU-
TOCRYPT: Enabling Homomorphic Computation on
Servers to Protect Sensitive Web Content. In Proc.
20th SIGSAC Conf. on Computer and Communica-
tions Security (CCS), pages 1297–1310.
Zhang, Y., Steele, A., and Blanton, M. (2013). PICCO:
A General-Purpose Compiler for Private Distributed
Computation. In Proc. 20th SIGSAC Conf. on Com-
puter and Communications Security (CCS), pages
813–826.
Ziegeldorf, J. H., Metzke, J., Henze, M., and Wehrle,
K. (2015). Choose Wisely: A Comparison of Se-
cure Two-Party Computation Frameworks. In Proc.
IEEE Symposium on Security and Privacy Workshops
(SPW), pages 198–205.