A Survey of Secure Computation Using Trusted Execution Environments
- URL: http://arxiv.org/abs/2302.12150v1
- Date: Thu, 23 Feb 2023 16:33:56 GMT
- Title: A Survey of Secure Computation Using Trusted Execution Environments
- Authors: Xiaoguo Li and Bowen Zhao and Guomin Yang and Tao Xiang and Jian Weng
and Robert H. Deng
- Abstract summary: This article provides a systematic review and comparison of TEE-based secure computation protocols.
We first propose a taxonomy that classifies secure computation protocols into three major categories, namely secure outsourced computation, secure distributed computation and secure multi-party computation.
Based on these criteria, we review, discuss and compare the state-of-the-art TEE-based secure computation protocols for both general-purpose computation functions and special-purpose ones.
- Score: 80.58996305474842
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As an essential technology underpinning trusted computing, the trusted
execution environment (TEE) allows one to launch computation tasks on both on-
and off-premises data while assuring confidentiality and integrity. This
article provides a systematic review and comparison of TEE-based secure
computation protocols. We first propose a taxonomy that classifies secure
computation protocols into three major categories, namely secure outsourced
computation, secure distributed computation and secure multi-party computation.
To enable a fair comparison of these protocols, we also present comprehensive
assessment criteria with respect to four aspects: setting, methodology,
security and performance. Based on these criteria, we review, discuss and
compare the state-of-the-art TEE-based secure computation protocols for both
general-purpose computation functions and special-purpose ones, such as
privacy-preserving machine learning and encrypted database queries. To the best
of our knowledge, this article is the first survey to review TEE-based secure
computation protocols and the comprehensive comparison can serve as a guideline
for selecting suitable protocols for deployment in practice. Finally, we also
discuss several future research directions and challenges.
Related papers
- SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Verifiable Privacy-Preserving Computing [3.543432625843538]
We analyze existing solutions that combine verifiability with privacy-preserving computations over distributed data.
We classify and compare 37 different schemes, regarding solution approach, security, efficiency, and practicality.
arXiv Detail & Related papers (2023-09-15T08:44:13Z) - Evaluating Model-free Reinforcement Learning toward Safety-critical
Tasks [70.76757529955577]
This paper revisits prior work in this scope from the perspective of state-wise safe RL.
We propose Unrolling Safety Layer (USL), a joint method that combines safety optimization and safety projection.
To facilitate further research in this area, we reproduce related algorithms in a unified pipeline and incorporate them into SafeRL-Kit.
arXiv Detail & Related papers (2022-12-12T06:30:17Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations [0.5825410941577593]
Cloud-based quantum computing has become vital to provide strong guarantees that computations delegated by clients to quantum service providers have been executed faithfully.
Current protocols lack at least one of the following three ingredients: composability, noise-robustness and modularity.
This paper lays out the fundamental structure of SDQC protocols, namely mixing two components: the Cryptography which the client would like the server to perform and tests that are designed to detect a server's malicious behaviour.
Changing the types of tests and how they are mixed with the client's computation automatically yields new SDQC protocols with different security and noise-
arXiv Detail & Related papers (2022-06-01T17:03:07Z) - Byzantine-Robust Federated Learning with Optimal Statistical Rates and
Privacy Guarantees [123.0401978870009]
We propose Byzantine-robust federated learning protocols with nearly optimal statistical rates.
We benchmark against competing protocols and show the empirical superiority of the proposed protocols.
Our protocols with bucketing can be naturally combined with privacy-guaranteeing procedures to introduce security against a semi-honest server.
arXiv Detail & Related papers (2022-05-24T04:03:07Z) - A Systematic Comparison of Encrypted Machine Learning Solutions for
Image Classification [11.6906656396618]
This work provides a comprehensive review of existing frameworks based on secure computing techniques in the context of private image classification.
Experiments were conducted using four state-of-the-art libraries implementing secure computing at the heart of the data science stack.
arXiv Detail & Related papers (2020-11-10T18:33:31Z) - Recent Trends in the Use of Statistical Tests for Comparing Swarm and
Evolutionary Computing Algorithms: Practical Guidelines and a Critical Review [0.0]
We conduct a survey on the current trends of the proposals of statistical analyses for the comparison of algorithms of computational intelligence.
We describe the main advantages and drawbacks of the use of each kind of test and put forward some recommendations concerning their use.
arXiv Detail & Related papers (2020-02-21T11:06:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.