Secret shared random access machine

Shlomi Dolev, Yin Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

The computations over RAM are preferred over computations with circuits or Turing machines. Secure and private RAM executions become more and more important in the scope avoiding information leakage when executing programs over a single computer as well as over the clouds. In this paper, we propose a distributed scheme for evaluating RAM programs without revealing any information on the computation including the program, the data and the result. We use the Shamir secret sharing to share all the program instructions and private string matching technique to ensure the correct instruction execution. We stress that our scheme obtains information theoretic security and does not rely on any computational hardness assumptions, therefore, gaining indefinite private and secure RAM execution of perfectly unrevealed programs.

Original languageEnglish
Title of host publicationAlgorithmic Aspects of Cloud Computing - 1st International Workshop, ALGOCLOUD 2015, Revised Selected Papers
EditorsPeter Triantafillou, Ioannis Karydis, Spyros Sioutas, Dimitrios Tsoumakos
PublisherSpringer Verlag
Pages19-34
Number of pages16
ISBN (Print)9783319299181
DOIs
StatePublished - 1 Jan 2016
Event1st International Workshop on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2015 - Patras, Greece
Duration: 14 Sep 201515 Sep 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9511
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Workshop on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2015
Country/TerritoryGreece
CityPatras
Period14/09/1515/09/15

Keywords

  • Information theoretic secure
  • Random access machine
  • Shamir secret sharing

Fingerprint

Dive into the research topics of 'Secret shared random access machine'. Together they form a unique fingerprint.

Cite this