Abstract
The computations over RAM are preferred over computations with circuits or Turing machines. Secure and private RAM executions become more and more important in the scope avoiding information leakage when executing programs over a single computer as well as over the clouds. In this paper, we propose a distributed scheme for evaluating RAM programs without revealing any information on the computation including the program, the data and the result. We use the Shamir secret sharing to share all the program instructions and private string matching technique to ensure the correct instruction execution. We stress that our scheme obtains information theoretic security and does not rely on any computational hardness assumptions, therefore, gaining indefinite private and secure RAM execution of perfectly unrevealed programs.
S. Dolev—Partially supported by Kamin grant of the Israeli economy ministry, and the Rita Altura Trust Chair in Computer Sciences.
Y. Li—The author would like to acknowledge the Lynne and William Frankel Center as it supports students travel for presenting their works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
One can check that Step 6 in Algorithm 1 is equivalent to the bitwise OR operation.
- 2.
The original algorithm is designed for bivariate polynomial, we modified it accordingly.
References
Amazon Elastic Compute Cloud (EC2). http://aws.amazon.com/ec2
Afshar, A., Hu, Z., Mohassel, P., Rosulek, M.: How to efficiently evaluate RAM programs with malicious security, Cryptology ePrint Archive, Report 2014/759 (2014)
Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware trojans. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 197–214. Springer, Heidelberg (2013)
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC 1988), NY, USA, pp. 1–10. ACM, New York (1988)
Boyle, E., Goldwasser, S., Tessaro, S.: Communication locality in secure multi-party computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 356–376. Springer, Heidelberg (2013)
Boyle, E., Chung, K.M., Pass, R.: Large-scale secure computation, Cryptology ePrint Archive, Report 2014/404 (2014)
Brenner, M., Wiebelitz, J., von Voigt, G., Smith, M.: Secret program execution in the cloud applying homomorphic encryption. In: Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies Conference (DEST), pp. 114–119 (2011)
Brenner, M., Perl, H., Smith, M.: How practical is homomorphically encrypted program execution? An implementation and performance evaluation. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 375–382 (2012)
Clash of the clouds. The Economist. http://www.economist.com/displaystory.cfm?story_id=14637206;2009
Damgård, I., Meldgaard, S., Nielsen, J.B.: Perfectly secure oblivious RAM without random oracles. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 144–163. Springer, Heidelberg (2011)
Dolev, S., Garay, J., Gilboa, N., Kolesnikov, V.: Swarming secrets. In: 47th Annual Allerton Conference, pp. 1438–1445 (2009)
Dolev, S., Gilboa, N., Li, X.: Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing (SCC 2015), pp. 21–29. ACM, New York (2015)
Google Cloud Platform. https://cloud.google.com/storage/
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169–178. ACM (2009)
Gentry, C.: A fully homomorphic encryption scheme, Ph.D. dissertation, Stanford University (2009)
Gentry, C., Halevi, S.: Implementing Gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)
Gentry, C., Goldman, K.A., Halevi, S., Julta, C., Raykova, M., Wichs, D.: Optimizing ORAM and using it efficiently for secure computation. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 1–18. Springer, Heidelberg (2013)
Goldreich, O.: Towards a theory of software protection and simulation by oblivious RAMs. In: STOC (1987)
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43, 431–473 (1996)
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Oblivious RAM simulation with efficient worst-case access overhead. In: ACM Cloud Computing Security Workshop (CCSW) (2011)
HOMOMORPHIC ENCRYPTION. http://sites.nyuad.nyu.edu/moma/projects.html
Liu, C., Huang, Y., Shi, E., Katz, J., Hicks, M.: Automating efficient RAM-model secure computation. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP 2014), pp. 623–638. IEEE Computer Society, Washington, D.C. (2014)
Lu, S., Ostrovsky, R.: How to garble RAM programs? In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 719–734. Springer, Heidelberg (2013)
Mazonka, O., Kolodin, A.: A simple multi-processor computer based on subleq, arXiv preprint arxiv:1106.2593 (2011). http://da.vidr.cc/projects/subleq/
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Stefanov, E., Shi, E.: Multi-cloud oblivious storage. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS 2013), NY, USA, pp. 247–258. ACM, New York (2013)
SUBLEQ. http://mazonka.com/subleq/
Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)
Wang, X., Huang, Y., Chan, T.-H.H., Shelat, A., Shi, E.: SCORAM: oblivious RAM for secure computation. In: The 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, November 2014
Welch, L., Berlekamp, E.R.: Error correction for algebraic block codes, US Patent, 4 633 470 (1983)
Zhuravlev, D., Samoilovych, I., Orlovskyi, R., Bondarenko, I., Lavrenyuk, Y.: Encrypted program execution. In: IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 817—822 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Dolev, S., Li, Y. (2016). Secret Shared Random Access Machine. In: Karydis, I., Sioutas, S., Triantafillou, P., Tsoumakos, D. (eds) Algorithmic Aspects of Cloud Computing. ALGOCLOUD 2015. Lecture Notes in Computer Science(), vol 9511. Springer, Cham. https://doi.org/10.1007/978-3-319-29919-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-29919-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29918-1
Online ISBN: 978-3-319-29919-8
eBook Packages: Computer ScienceComputer Science (R0)