A Survey of Secure Computation Using Trusted Execution Environments

02/23/2023
by   Xiaoguo Li, et al.
0

As an essential technology underpinning trusted computing, the trusted execution environment (TEE) allows one to launch computation tasks on both on- and off-premises data while assuring confidentiality and integrity. This article provides a systematic review and comparison of TEE-based secure computation protocols. We first propose a taxonomy that classifies secure computation protocols into three major categories, namely secure outsourced computation, secure distributed computation and secure multi-party computation. To enable a fair comparison of these protocols, we also present comprehensive assessment criteria with respect to four aspects: setting, methodology, security and performance. Based on these criteria, we review, discuss and compare the state-of-the-art TEE-based secure computation protocols for both general-purpose computation functions and special-purpose ones, such as privacy-preserving machine learning and encrypted database queries. To the best of our knowledge, this article is the first survey to review TEE-based secure computation protocols and the comprehensive comparison can serve as a guideline for selecting suitable protocols for deployment in practice. Finally, we also discuss several future research directions and challenges.

READ FULL TEXT

page 1

page 10

page 12

page 19

page 36

research
11/10/2020

A Systematic Comparison of Encrypted Machine Learning Solutions for Image Classification

This work provides a comprehensive review of existing frameworks based o...
research
04/10/2018

A Performance and Resource Consumption Assessment of Secure Multiparty Computation

In recent years, secure multiparty computation (SMC) advanced from a the...
research
05/03/2019

A Hybrid Approach to Secure Function Evaluation Using SGX

A protocol for two-party secure function evaluation (2P-SFE) aims to all...
research
05/26/2022

SoK: Decentralized Randomness Beacon Protocols

The scientific interest in the area of Decentralized Randomness Beacon (...
research
08/14/2016

Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

The notion of Integrated Modular Avionics (IMA) refers to inter-connecte...
research
10/13/2020

CrypTFlow2: Practical 2-Party Secure Inference

We present CrypTFlow2, a cryptographic framework for secure inference ov...
research
10/01/2018

AND Protocols Using Only Uniform Shuffles

Secure multi-party computation using a deck of playing cards has been a ...

Please sign up or login with your details

Forgot password? Click here to reset