Cryptology ePrint Archive: Report 2015/547
Secure Computation of MIPS Machine Code
Xiao Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz
Abstract: Existing systems for secure computation require programmers to express the program to be securely computed as a circuit, or in some domain-specific language that can be compiled to a form suitable for applying known protocols. We propose a new system that can securely execute native MIPS code with no special annotations. Our system has the advantage of allowing programmers to use a language of their choice to express their programs, together with any off-the-shelf compiler to MIPS; it can be used for secure computation of existing “legacy” MIPS code as well.
Our system uses oblivious RAM for fetching instructions and performing load/store operations in memory, and garbled universal circuits for the execution of a MIPS ALU in each instruction step. We also explore various optimizations based on an offline analysis of the MIPS code to be executed, in order to minimize the overhead of executing each instruction while still maintaining security.
Category / Keywords: cryptographic protocols / secure computation, oram
Original Publication (with minor differences): ESORICS 2016
Date: received 4 Jun 2015, last revised 8 Jul 2016
Contact author: gordon at cs umd edu
Available format(s): PDF | BibTeX Citation
Version: 20160708:060348 (All versions of this report)
Short URL: ia.cr/2015/547
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]