2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2021
DOI: 10.1109/ipdps49936.2021.00115
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Scientific Computing Workloads on General Purpose TEEs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Enabling secure processing in such a hostile environment requires careful SVM installation and a process to verify the installation (called attestation), which are described in this paper in detail. The performance penalty of the on-the-fly data encryption and decryption during memory writes and reads in the TEE is on the order of a few percent compared to processing without the encryption turned on [11]. This development provoked the second branch of research on protecting data in use and the rise of confidential computing-the use of TEE in protecting the data that are processed on untrusted hardware.…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%
See 2 more Smart Citations
“…Enabling secure processing in such a hostile environment requires careful SVM installation and a process to verify the installation (called attestation), which are described in this paper in detail. The performance penalty of the on-the-fly data encryption and decryption during memory writes and reads in the TEE is on the order of a few percent compared to processing without the encryption turned on [11]. This development provoked the second branch of research on protecting data in use and the rise of confidential computing-the use of TEE in protecting the data that are processed on untrusted hardware.…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%
“…Later experiments confirmed these conclusions. Akram et al compared the SGX and SEV approaches on high-performance computing (HPC) benchmarks and concluded that SGX is not appropriate for HPC because it has a limited secure memory size and a complicated programming model, which leads to significant performance degradation compared to the unencrypted execution [11].…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…If they are all correct, the algorithm continues to be executed, and the intersection can be restored according to the results. (4) Step (5) uses the additive homomorphism of the Lifted-ElGamal threshold cryptosystem, i.e.,…”
Section: Correctness Analysismentioning
confidence: 99%
“…Cramer [3] also predicted that MPC would become a new and powerful tool for privacy protection. Cryptologists have studied the MPC algorithms in various fields including secure scientific computing solutions [1,[4][5][6], secure data mining [7,8], secure statistical analysis [9][10][11], secure computational geometry [12][13][14][15][16], and secure computing set [17][18][19][20]. These studies promoted the development of MPC.…”
Section: Introductionmentioning
confidence: 99%