Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134017
|View full text |Cite
|
Sign up to set email alerts
|

A Fast and Verified Software Stack for Secure Function Evaluation

Abstract: We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists of three components: i. a verified compiler (CircGen) that translates C programs into Boolean circuits; ii. a verified implementation of Yao's SFE protocol based on garbled circuits and oblivious transfer; and iii. transparent application integration and communications via FRESCO, an open-source framework for secure multiparty computation (MPC). CircGen is a general purpose tool that builds on CompCert, a verifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
68
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(69 citation statements)
references
References 50 publications
1
68
0
Order By: Relevance
“…We implement the online phase in FRESCO [22], an active open-source Java framework for MPC with a strong track record [14], [40]. We chose FRESCO as it offers an accessible API-based approach for writing MPC applications.…”
Section: Methodsmentioning
confidence: 99%
“…We implement the online phase in FRESCO [22], an active open-source Java framework for MPC with a strong track record [14], [40]. We chose FRESCO as it offers an accessible API-based approach for writing MPC applications.…”
Section: Methodsmentioning
confidence: 99%
“…Verified MPC toolchain. Almeida et al [4] build a verified toolchain consisting of (a) a verified circuit compiler from (a subset of) C to boolean circuits, and (b) a verified implementation of Yao's [64] garbled circuits protocol for 2-party MPC. They use CompCert [36] for the former, and EasyCrypt [11] for the latter.…”
Section: Related Workmentioning
confidence: 99%
“…To prove the interpreter behaves correctly, we prove, in F , that it correctly implements the formalized distributed semantics. The circuit library and the GMW implementation are not verified-while it is possible to verify the circuit library [4], verifying a GMW implementation is an open research question. But the stage is set for verified versions to be plugged into the Wys codebase.…”
Section: Introductionmentioning
confidence: 99%
“…AWS KMS, a core component of the AWS cloud, lets AWS customers create and manage encryption keys, providing a consistent view of encryption/decryption operations across AWS services, and controlling their use through AWS Identity and Access Management (IAM). 1 The widespread usage of AWS KMS and the central role of the DMP justifies a high-assurance security proof, leveraging recent developments in computer-aided cryptography such as [3,4,7].…”
Section: Introductionmentioning
confidence: 99%