Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name

20 Apr 2019 Peter T. Breuer

An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that environment. Encrypted computing is the emerging science and technology of processors that take encrypted inputs to encrypted outputs via encrypted intermediate values (at nearly conventional speeds)... (read more)

PDF Abstract
No code implementations yet. Submit your code now

Categories


  • CRYPTOGRAPHY AND SECURITY
  • PROGRAMMING LANGUAGES