Cryptology ePrint Archive: Report 2015/547

Secure Computation of MIPS Machine Code

Xiao Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz

Abstract: Existing systems for secure computation require programmers to express the program to be securely computed as a circuit, or in some domain-specific language that can be compiled to a form suitable for applying known protocols. We propose a new system that can securely execute native MIPS code with no special annotations. Our system has the advantage of allowing programmers to use a language of their choice to express their programs, together with any off-the-shelf compiler to MIPS; it can be used for secure computation of existing “legacy” MIPS code as well. Our system uses oblivious RAM for fetching instructions and performing load/store operations in memory, and garbled universal circuits for the execution of a MIPS ALU in each instruction step. We also explore various optimizations based on an offline analysis of the MIPS code to be executed, in order to minimize the overhead of executing each instruction while still maintaining security.

Category / Keywords: cryptographic protocols / secure computation, oram

Original Publication (with minor differences): ESORICS 2016

Date: received 4 Jun 2015, last revised 8 Jul 2016

Contact author: gordon at cs umd edu

Available format(s): PDF | BibTeX Citation

Version: 20160708:060348 (All versions of this report)

Short URL: ia.cr/2015/547

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]