Jan. 31, 2024, 2:10 a.m. | Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan

cs.CR updates on arXiv.org arxiv.org

Outsourced computation can put client data confidentiality at risk. Existing
solutions are either inefficient or insufficiently secure: cryptographic
techniques like fully-homomorphic encryption incur significant overheads, even
with hardware assistance, while the complexity of hardware-assisted trusted
execution environments has been exploited to leak secret data.


Recent proposals such as BliMe and OISA show how dynamic information flow
tracking (DIFT) enforced in hardware can protect client data efficiently. They
are designed to protect CPU-only workloads. However, many outsourced computing
applications, like machine …

accelerators arxiv assistance can client complexity computation confidentiality cryptographic data encryption environments exploited extensions hardware hardware security homomorphic encryption leak oblivious proposals risk secret security solutions techniques

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Researcher, SIEM

@ Huntress | Remote Canada

Senior Application Security Engineer

@ Revinate | San Francisco Bay Area

Cyber Security Manager

@ American Express Global Business Travel | United States - New York - Virtual Location

Incident Responder Intern

@ Bentley Systems | Remote, PA, US

SC2024-003533 Senior Online Vulnerability Assessment Analyst (CTS) - THU 9 May

@ EMW, Inc. | Mons, Wallonia, Belgium