On Obfuscating Compilation for Encrypted Computing
Peter T. Breuer, Jonathan Bowen, Esther Palomar, Zhiming Liu
2017
Abstract
This paper investigates conditions for privacy and security of data against the privileged operator on processors that ‘work encrypted’. A compliant machine code architecture plus an ‘obfuscating’ compiler turns out to be both necessary and sufficient to achieve that, the combination mathematically assuring the privacy of user data in arbitrary computations in an encrypted computing context.
DownloadPaper Citation
in Harvard Style
Breuer P., Bowen J., Palomar E. and Liu Z. (2017). On Obfuscating Compilation for Encrypted Computing . In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 247-254. DOI: 10.5220/0006394002470254
in Bibtex Style
@conference{secrypt17,
author={Peter T. Breuer and Jonathan Bowen and Esther Palomar and Zhiming Liu},
title={On Obfuscating Compilation for Encrypted Computing},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)},
year={2017},
pages={247-254},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006394002470254},
isbn={978-989-758-259-2},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)
TI - On Obfuscating Compilation for Encrypted Computing
SN - 978-989-758-259-2
AU - Breuer P.
AU - Bowen J.
AU - Palomar E.
AU - Liu Z.
PY - 2017
SP - 247
EP - 254
DO - 10.5220/0006394002470254