An architecture for provably secure computation

被引:0
|
作者
Ajtai, M [1 ]
Dwork, C [1 ]
Stockmeyer, L [1 ]
机构
[1] IBM Corp, Almaden Res Ctr, San Jose, CA 95120 USA
来源
关键词
D O I
10.1007/11682462_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe an architecture requiring very few changes to any standard von Neumann machine that provably withstands coalitions between a malicious operating system and other users, in the sense that: 1. If the operating system permits a program to run, then the program produces the same outputs as it would produce if it were running on an ideal, single-user machine; moreover, even if the operating system behaves according to expectations only most of the time, the programs get, executed. 2. The only information leaked by a program to the malicious coalition is the time and space requirements of the program. 3. If the malicious operating system is dynamically replaced by a good operating system, then the latter can quickly and correctly determine what memory resources are available for future programs, as well as how much time is left for each of the currently executing programs, and can distribute these resources without any restrictions. This can be accomplished without restarting currently executing programs. To our knowledge, ours is the first attempt to provide provable guarantees along these lines, and the first treatment of any kind, provable or otherwise, for the third property.
引用
收藏
页码:56 / 67
页数:12
相关论文
共 50 条
  • [1] Provably secure rational delegation computation protocol
    Tian Y.
    Li Q.
    Zhang D.
    Wang L.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (07): : 135 - 143
  • [2] Provably secure cloud storage for mobile networks with less computation and smaller overhead
    Zhang, Rui
    Ma, Hui
    Lu, Yao
    Li, Yang
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (12)
  • [3] Provably secure cloud storage for mobile networks with less computation and smaller overhead
    Rui ZHANG
    Hui MA
    Yao LU
    Yang LI
    Science China(Information Sciences), 2017, 60 (12) : 179 - 191
  • [4] Provably secure attribute based signcryption with delegated computation and efficient key updating
    Hong, Hanshu
    Xia, Yunhao
    Sun, Zhixin
    Liu, Ximeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2646 - 2659
  • [5] Provably secure cloud storage for mobile networks with less computation and smaller overhead
    Rui Zhang
    Hui Ma
    Yao Lu
    Yang Li
    Science China Information Sciences, 2017, 60
  • [6] A Distributed Architecture for Secure Delegated Quantum Computation
    Ma, Shuquan
    Zhu, Changhua
    Quan, Dongxiao
    Nie, Min
    ENTROPY, 2022, 24 (06)
  • [7] Provably Secure Steganography
    Hopper, Nicholas
    von Ahn, Luis
    Langford, John
    IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (05) : 662 - 676
  • [8] VMCrypt - Modular Software Architecture for Scalable Secure Computation
    Malka, Lior
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 715 - 724
  • [9] Secure untrusted binaries - Provably!
    Winwood, S
    Chakravarty, MMT
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 171 - 186
  • [10] Provably secure masking of AES
    Blömer, J
    Guajardo, J
    Krummel, V
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 69 - 83