Investigating the application of one instruction set computing for encrypted data computation

Nektarios Georgios Tsoutsos, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The cloud computing revolution has emphasized the need to execute programs in private using third party infrastructure. In this work, we investigate the application of One Instruction Set Computing (OISC) for processing encrypted data. This novel architecture combines the simplicity and high throughput of OISC with the security of well-known homomorphic encryption schemes, allowing execution of encrypted machine code and secure computation over encrypted data. In the presented case study, we choose addleq as the OISC instruction and Paillier's scheme for encryption, and we extensively discuss the architecture and security implications of encrypting the instructions and memory accesses. Preliminary results in our implemented hardware-cognizant software simulator indicate an average execution overhead of 26 times for 1024-bit security parameter, compared to unencrypted execution of the same OISC programs.

Original languageEnglish (US)
Title of host publicationSecurity, Privacy, and Applied Cryptography Engineering - 3rd International Conference, SPACE 2013, Proceedings
PublisherSpringer Verlag
Pages21-37
Number of pages17
ISBN (Print)9783642412233
DOIs
StatePublished - 2013
Event3rd International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2013 - Kharagpur, India
Duration: Oct 19 2013Oct 23 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8204 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2013
Country/TerritoryIndia
CityKharagpur
Period10/19/1310/23/13

Keywords

  • Encrypted processor
  • Paillier
  • cloud computing
  • homomorphic encryption

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Investigating the application of one instruction set computing for encrypted data computation'. Together they form a unique fingerprint.

Cite this