An Information Obfuscation Calculus for Encrypted Computing

Relative cryptographic semantic security for encrypted words of user data at runtime holds in the emerging field of encrypted computing, in conjunction with an appropriate instruction set and compiler. An information obfuscation calculus for program compilation in that context is introduced here that quantifies the security exactly, improving markedly on the result.

[1]  Peter T. Breuer,et al.  On Security in Encrypted Computing , 2018, ICICS.

[2]  Michael Hamburg,et al.  Meltdown , 2018, meltdownattack.com.

[3]  Peter T. Breuer,et al.  A Fully Homomorphic Crypto-Processor Design , 2013, ESSoS.

[4]  Michael Hamburg,et al.  Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[5]  Y. Sundblad The Ackermann function. a theoretical, computational, and formula manipulative study , 1971 .

[6]  Nitin Upadhyay programming Languages: C, C++, VC++6.0 , 2007 .

[7]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[8]  C. A. R. HOARE,et al.  An axiomatic basis for computer programming , 1969, CACM.

[9]  Sri Parameswaran,et al.  CryptoBlaze: A partially homomorphic processor with multiple instructions and non-deterministic encryption support , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).

[10]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[11]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[12]  Alex Biryukov Known plaintext attack , 2005, Encyclopedia of Cryptography and Security.

[13]  Peter T. Breuer,et al.  A Practical Encrypted Microprocessor , 2016, SECRYPT.

[14]  Peter T. Breuer,et al.  On Obfuscating Compilation for Encrypted Computing , 2017, SECRYPT.

[15]  Nektarios Georgios Tsoutsos,et al.  The HEROIC Framework: Encrypted Computation Without Shared Keys , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[16]  Peter Schartner,et al.  On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack , 2016, IEEE Access.

[17]  Peter T. Breuer,et al.  Superscalar Encrypted RISC: The Measure of a Secret Computer , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[18]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .