{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:24:50Z","timestamp":1765369490630},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030321000"},{"type":"electronic","value":"9783030321017"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32101-7_37","type":"book-chapter","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T11:04:00Z","timestamp":1570791840000},"page":"646-666","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["One-Time Programs Made Practical"],"prefix":"10.1007","author":[{"given":"Lianying","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Joseph I.","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Didem","family":"Demirag","sequence":"additional","affiliation":[]},{"given":"Kevin R. B.","family":"Butler","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Clark","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,30]]},"reference":[{"unstructured":"Ayday, E., Raisaro, J.L., Laren, M., Jack, P., Fellay, J., Hubaux, J.P.: Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. In: Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech 2013). No. EPFL-CONF-187118 (2013)","key":"37_CR1"},{"doi-asserted-by":"crossref","unstructured":"Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering gattaca: efficient and secure testing of fully-sequenced human genomes. In: Proceedings of the 18th ACM CCS 2011, pp. 691\u2013702 (2011)","key":"37_CR2","DOI":"10.1145\/2046707.2046785"},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-34961-4_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"M Bellare","year":"2012","unstructured":"Bellare, M., Hoang, V.T., Rogaway, P.: Adaptively secure garbling with applications to one-time programs and secure outsourcing. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 134\u2013153. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-34961-4_10"},{"unstructured":"Brasser, F., M\u00fcller, U., Dmitrienko, A., Kostiainen, K., Capkun, S., Sadeghi, A.R.: Software grand exposure: SGX cache attacks are practical. In: 11th USENIX Workshop on Offensive Technologies (WOOT 2017), Vancouver, BC (2017)","key":"37_CR4"},{"key":"37_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-40084-1_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"A Broadbent","year":"2013","unstructured":"Broadbent, A., Gutoski, G., Stebila, D.: Quantum one-time programs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 344\u2013360. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-40084-1_20"},{"unstructured":"Bulck, J.V., et al.: Foreshadow: extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In: USENIX Security Symposium, Baltimore, MD, USA, pp. 991\u20131008 (2018)","key":"37_CR6"},{"issue":"1","key":"37_CR7","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/TITB.2011.2171701","volume":"16","author":"M Canim","year":"2012","unstructured":"Canim, M., Kantarcioglu, M., Malin, B.: Secure management of biomedical data with cryptographic hardware. IEEE Trans. Inf Technol. Biomed. 16(1), 166\u2013175 (2012)","journal-title":"IEEE Trans. Inf Technol. Biomed."},{"unstructured":"Cariaso, M., Lennon, G.: SNPedia: a wiki supporting personal genome annotation, interpretation and analysis (2010). \n                      http:\/\/www.SNPedia.com","key":"37_CR8"},{"unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science, pp. 41\u201350. IEEE (1995)","key":"37_CR9"},{"unstructured":"Fisch, B.A., Vinayagamurthy, D., Boneh, D., Gorbunov, S.: Iron: functional encryption using Intel SGX. Technical report, IACR eprint (2016)","key":"37_CR10"},{"unstructured":"Gnu.org: The multiboot specification (2009). \n                      http:\/\/www.gnu.org\/software\/grub\/manual\/multiboot\/multiboot.html","key":"37_CR11"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-85174-5_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"S Goldwasser","year":"2008","unstructured":"Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39\u201356. Springer, Heidelberg (2008). \n                      https:\/\/doi.org\/10.1007\/978-3-540-85174-5_3"},{"unstructured":"Greene, J.: Intel\u00ae trusted execution technology. Technical report (2012)","key":"37_CR13"},{"issue":"3","key":"37_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0089204","volume":"9","author":"B Greshake","year":"2014","unstructured":"Greshake, B., Bayer, P.E., Rausch, H., Reda, J.: Opensnp-a crowdsourced web resource for personal genomics. PLoS ONE 9(3), 1\u20139 (2014)","journal-title":"PLoS ONE"},{"doi-asserted-by":"crossref","unstructured":"Guan, L., Lin, J., Luo, B., Jing, J.: Copker: computing with private keys without RAM. In: NDSS, San Diego, CA, USA, February 2014","key":"37_CR15","DOI":"10.14722\/ndss.2014.23125"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-85230-8_8","volume-title":"Financial Cryptography and Data Security","author":"V Gunupudi","year":"2008","unstructured":"Gunupudi, V., Tate, S.R.: Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 98\u2013112. Springer, Heidelberg (2008). \n                      https:\/\/doi.org\/10.1007\/978-3-540-85230-8_8"},{"unstructured":"Halderman, J.A., et al.: Lest we remember: cold boot attacks on encryption keys. In: USENIX Sec 2008, San Jose, CA, USA (2008)","key":"37_CR17"},{"unstructured":"Han, S., Shin, W., Park, J.H., Kim, H.: A bad dream: subverting trusted platform module while you are sleeping. In: 27th USENIX Security Symposium (USENIX Security 2018), Baltimore, MD, USA, pp. 1229\u20131246 (2018)","key":"37_CR18"},{"key":"37_CR19","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14303-8","volume-title":"Efficient Secure Two-Party Protocols","author":"C Hazay","year":"2010","unstructured":"Hazay, C., Lindell, Y.: Efficient Secure Two-Party Protocols. ISC. Springer, Heidelberg (2010). \n                      https:\/\/doi.org\/10.1007\/978-3-642-14303-8"},{"unstructured":"Intel Corporation: Trusted boot (tboot), version: 1.8.0 (2017). \n                      http:\/\/tboot.sourceforge.net\/","key":"37_CR20"},{"key":"37_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-15031-9_26","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"K J\u00e4rvinen","year":"2010","unstructured":"J\u00e4rvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Garbled circuits for leakage-resilience: hardware implementation and evaluation of one-time programs. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 383\u2013397. Springer, Heidelberg (2010). \n                      https:\/\/doi.org\/10.1007\/978-3-642-15031-9_26"},{"unstructured":"Jefferies, C.P.: How to identify user-upgradeable notebooks, June 2017. \n                      http:\/\/www.notebookreview.com\/feature\/identify-user-upgradeable-notebooks\/","key":"37_CR22"},{"issue":"5","key":"37_CR23","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TITB.2007.908465","volume":"12","author":"M Kantarcioglu","year":"2008","unstructured":"Kantarcioglu, M., Jiang, W., Liu, Y., Malin, B.: A cryptographic approach to securely share and query genomic sequences. IEEE Trans. Inf Technol. Biomed. 12(5), 606\u2013617 (2008)","journal-title":"IEEE Trans. Inf Technol. Biomed."},{"doi-asserted-by":"crossref","unstructured":"Kirkpatrick, M.S., Kerr, S., Bertino, E.: PUF ROKs: a hardware approach to read-once keys. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, AsiaCCS 2011, Hong Kong, China, pp. 155\u2013164 (2011)","key":"37_CR24","DOI":"10.1145\/1966913.1966934"},{"doi-asserted-by":"crossref","unstructured":"Kitamura, T., Shinagawa, K., Nishide, T., Okamoto, E.: One-time programs with cloud storage and its application to electronic money. In: APKC (2017)","key":"37_CR25","DOI":"10.1145\/3055504.3055507"},{"doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. CoRR (2018)","key":"37_CR26","DOI":"10.1109\/SP.2019.00002"},{"doi-asserted-by":"crossref","unstructured":"Kollenda, B., Koppe, P., Fyrbiak, M., Kison, C., Paar, C., Holz, T.: An exploratory analysis of microcode as a building block for system defenses. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 1649\u20131666 (2018)","key":"37_CR27","DOI":"10.1145\/3243734.3243861"},{"unstructured":"Koppe, P., et al.: Reverse engineering x86 processor microcode. In: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 1163\u20131180 (2017)","key":"37_CR28"},{"unstructured":"Lee, S., Shih, M.W., Gera, P., Kim, T., Kim, H., Peinado, M.: Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 557\u2013574 (2017)","key":"37_CR29"},{"unstructured":"Lipp, M., et al.: Meltdown. CoRR (2018)","key":"37_CR30"},{"unstructured":"McCune, J.M.: Reducing the trusted computing base for applications on commodity systems. Ph.D. thesis, Carnegie Mellon University (2009)","key":"37_CR31"},{"doi-asserted-by":"crossref","unstructured":"Mood, B., Gupta, D., Carter, H., Butler, K., Traynor, P.: Frigate: a validated, extensible, and efficient compiler and interpreter for secure computation. In: Euro-SP (2016)","key":"37_CR32","DOI":"10.1109\/EuroSP.2016.20"},{"unstructured":"M\u00fcller, T., Freiling, F.C., Dewald, A.: TRESOR runs encryption securely outside RAM. In: USENIX Security Symposium, San Francisco, CA, USA, August 2011","key":"37_CR33"},{"doi-asserted-by":"crossref","unstructured":"Naveed, M., et al.: Controlled functional encryption. In: CCS 2014, pp. 1280\u20131291. ACM (2014)","key":"37_CR34","DOI":"10.1145\/2660267.2660291"},{"unstructured":"Naveed, M., et al.: Privacy and security in the genomic era. In: CCS 2014 (2014)","key":"37_CR35"},{"unstructured":"nccgroup: Cachegrab, December 2017. \n                      https:\/\/github.com\/nccgroup\/cachegrab","key":"37_CR36"},{"doi-asserted-by":"crossref","unstructured":"Saint-Jean, F.: Java implementation of a single-database computationally symmetric private information retrieval (cSPIR) protocol. Technical report, Yale University Department of Computer Science (2005)","key":"37_CR37","DOI":"10.21236\/ADA459016"},{"unstructured":"Sevinsky, R.: Funderbolt: Adventures in Thunderbolt DMA Attacks. Black Hat USA (2013)","key":"37_CR38"},{"doi-asserted-by":"crossref","unstructured":"Simmons, P.: Security through Amnesia: a software-based solution to the cold boot attack on disk encryption. In: ACSAC (2011)","key":"37_CR39","DOI":"10.1145\/2076732.2076743"},{"unstructured":"Sottek, T.: NSA reportedly intercepting laptops purchased online to install spy malware, December 2013. \n                      https:\/\/www.theverge.com\/2013\/12\/29\/5253226\/nsa-cia-fbi-laptop-usb-plant-spy","key":"37_CR40"},{"doi-asserted-by":"crossref","unstructured":"Strackx, R., Jacobs, B., Piessens, F.: ICE: a passive, high-speed, state-continuity scheme. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, Louisiana, USA, pp. 106\u2013115 (2014)","key":"37_CR41","DOI":"10.1145\/2664243.2664259"},{"unstructured":"Strackx, R., Piessens, F.: Ariadne: a minimal approach to state continuity. In: 25th USENIX Security Symposium (USENIX Sec 2016), Austin, TX, pp. 875\u2013892 (2016)","key":"37_CR42"},{"unstructured":"Tarnovsky, C.: Attacking TPM part 2: a look at the ST19WP18 TPM device, July 2012. dEFCON presentation. \n                      https:\/\/www.defcon.org\/html\/links\/dc-archives\/dc-20-archive.html","key":"37_CR43"},{"unstructured":"Trusted Computing Group: TCG Platform Reset Attack Mitigation Specification, May 2008","key":"37_CR44"},{"unstructured":"Trusted Computing Group: Trusted Platform Module Main Specification, version 1.2, revision 116 (2011). \n                      https:\/\/trustedcomputinggroup.org\/tpm-main-specification\/","key":"37_CR45"},{"doi-asserted-by":"crossref","unstructured":"Vasiliadis, G., Athanasopoulos, E., Polychronakis, M., Ioannidis, S.: PixelVault: using GPUs for securing cryptographic operations. In: CCS 2014, Scottsdale, AZ, USA, November 2014","key":"37_CR46","DOI":"10.1145\/2660267.2660316"},{"doi-asserted-by":"crossref","unstructured":"Vidas, T.: Volatile memory acquisition via warm boot memory survivability. In: 43rd Hawaii International Conference on System Sciences, pp. 1\u20136, January 2010","key":"37_CR47","DOI":"10.1109\/HICSS.2010.439"},{"issue":"28","key":"37_CR48","doi-asserted-by":"publisher","first-page":"12629","DOI":"10.1073\/pnas.1007983107","volume":"107","author":"T Walsh","year":"2010","unstructured":"Walsh, T., et al.: Detection of inherited mutations for breast and ovarian cancer using genomic capture and massively parallel sequencing. Natl Acad. Sci. 107(28), 12629\u201312633 (2010)","journal-title":"Natl Acad. Sci."},{"doi-asserted-by":"crossref","unstructured":"Wang, X.S., Huang, Y., Zhao, Y., Tang, H., Wang, X., Bu, D.: Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: CCS, pp. 492\u2013503. ACM (2015)","key":"37_CR49","DOI":"10.1145\/2810103.2813725"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: FOCS (1982)","key":"37_CR50","DOI":"10.1109\/SFCS.1982.38"},{"unstructured":"Zhang, N., Sun, K., Shands, D., Lou, W., Hou, Y.T.: Truspy: cache side-channel information leakage from the secure world on ARM devices. IACR Cryptology ePrint Archive 2016, 980 (2016)","key":"37_CR51"},{"unstructured":"Zhao, L., et al.: One-time programs made practical (2019). \n                      http:\/\/arxiv.org\/abs\/1907.00935","key":"37_CR52"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32101-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T11:10:01Z","timestamp":1570792201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32101-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030321000","9783030321017"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32101-7_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Kitts","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Kitts and Nevis","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc19.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"178","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,08","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7,6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}