Abstract
Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.
Original language | English |
---|---|
Pages (from-to) | 59-78 |
Number of pages | 20 |
Journal | Acta Informatica |
Volume | 60 |
Issue number | 1 |
DOIs | |
State | Published - 1 Mar 2023 |
ASJC Scopus subject areas
- Software
- Information Systems
- Computer Networks and Communications