{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:09:02Z","timestamp":1750136942598},"publisher-location":"Berlin, Heidelberg","reference-count":50,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662533567"},{"type":"electronic","value":"9783662533574"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_20","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T13:22:01Z","timestamp":1472563321000},"page":"302-318","source":"Crossref","is-referenced-by-count":21,"title":["Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation"],"prefix":"10.1007","author":[{"given":"Debayan","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Mood","sequence":"additional","affiliation":[]},{"given":"Joan","family":"Feigenbaum","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Butler","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"20_CR1","unstructured":"Anati, I., Gueron, S., Johnson, S., Scarlata, V.: Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (2013)"},{"key":"20_CR2","unstructured":"Arasu, A., Blanas, S., Eguro, K., Kaushik, R., Kossmann, D., Ramamurthy, R., Venkatesan, R.: Orthogonal security with cipherbase. In: CIDR (2013)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D Aucsmith","year":"1996","unstructured":"Aucsmith, D.: Tamper resistant software: an implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"issue":"3","key":"20_CR4","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1109\/TKDE.2013.38","volume":"26","author":"S Bajaj","year":"2014","unstructured":"Bajaj, S., Sion, R.: TrustedDB: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans. Knowl. Data Eng. 26(3), 752\u2013765 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"20_CR5","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2014)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-642-32946-3_5","volume-title":"Financial Cryptography and Data Security","author":"D Bogdanov","year":"2012","unstructured":"Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 57\u201364. Springer, Heidelberg (2012)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","volume-title":"Financial Cryptography and Data Security","author":"P Bogetoft","year":"2009","unstructured":"Bogetoft, P., Christensen, D.L., Damg\u00e5rd, I., Geisler, M., Jakobsen, T., Kr\u00f8igaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325\u2013343. Springer, Heidelberg (2009)"},{"key":"20_CR8","unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In: Proceedings of the USENIX Security Symposium (2010)"},{"issue":"7","key":"20_CR9","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1002\/sec.851","volume":"7","author":"H Carter","year":"2014","unstructured":"Carter, H., Amrutkar, C., Dacosta, I., Traynor, P.: For your phone only: custom protocols for efficient secure function evaluation on mobile devices. J. Secur. Commun. Netw. (SCN) 7(7), 1165\u20131176 (2014)","journal-title":"J. Secur. Commun. Netw. (SCN)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Carter, H., Lever, C., Traynor, P.: Whitewash: outsourcing garbled circuit generation for mobile devices. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC) (2014)","DOI":"10.1145\/2664243.2664255"},{"key":"20_CR11","unstructured":"Carter, H., Mood, B., Traynor, P., Butler, K.: Secure outsourced garbled circuit evaluation for mobile devices. In: Proceedings of the USENIX Security Symposium (SECURITY 2013) (2013)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-319-26823-1_15","volume-title":"Cryptology and Network Security","author":"H Carter","year":"2015","unstructured":"Carter, H., Mood, B., Traynor, P., Butler, K.: Outsourcing secure two-party computation as a black box. In: Reiter, M., et al. (eds.) CANS 2015. LNCS, vol. 9476, pp. 214\u2013222. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26823-1_15"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, vol. 2, pp. 119\u2013129. IEEE (2000)","DOI":"10.1109\/DISCEX.2000.821514"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-662-44774-1_15","volume-title":"Financial Cryptography and Data Security","author":"G Crescenzo Di","year":"2014","unstructured":"Di Crescenzo, G., Feigenbaum, J., Gupta, D., Panagos, E., Perry, J., Wright, R.N.: Practical and privacy-preserving policy compliance for outsourced data. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 181\u2013194. Springer, Heidelberg (2014)"},{"issue":"1","key":"20_CR15","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/2654822.2541986","volume":"42","author":"J Criswell","year":"2014","unstructured":"Criswell, J., Dautenhahn, N., Adve, V.: Virtual ghost: protecting applications from hostile operating systems. ACM SIGARCH Comput. Architect. News 42(1), 81\u201396 (2014)","journal-title":"ACM SIGARCH Comput. Architect. News"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/978-3-642-00468-1_10","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"I Damg\u00e5rd","year":"2009","unstructured":"Damg\u00e5rd, I., Geisler, M., Kr\u00f8igaard, M., Nielsen, J.B.: Asynchronous multiparty computation: theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160\u2013179. Springer, Heidelberg (2009)"},{"key":"20_CR17","unstructured":"Erlingsson, \u00da., Abadi, M.: Operating system protection against side-channel attacks that exploit memory latency. Technical report, MSR-TR-2007-117, Microsoft Research (2007)"},{"key":"20_CR18","unstructured":"Ferguson, N.: AES-CBC+ elephant diffuser: A disk encryption algorithm for windows vista. Technical report, Microsoft (2006)"},{"issue":"3","key":"20_CR19","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM (JACM) 43(3), 431\u2013473 (1996)","journal-title":"J. ACM (JACM)"},{"key":"20_CR20","unstructured":"Greene, J.: Intel trusted execution technology. Intel Technology White Paper (2012)"},{"key":"20_CR21","unstructured":"Group, T.C.: Trusted platform module main specification (tpm1.0) (2011). http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification"},{"key":"20_CR22","unstructured":"Group, T.C.: Trusted platform module library specification (tpm2.0) (2013). http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_library_specification"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Gupta, D., Segal, A., Panda, A., Segev, G., Schapira, M., Feigenbaum, J., Rexford, J., Shenker, S.: A new approach to interdomain routing based on secure multi-party computation. In: Proceedings of the 11th ACM Workshop on Hot Topics in Networks, pp. 37\u201342. ACM (2012)","DOI":"10.1145\/2390231.2390238"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Henecka, W., Kogl, S., Sadeghi, A.R., Schneider, T., Wehrenberg, I.: Tasty: tool for automating secure two-party computations. In: Proceedings of the Conference on Computer and Communications Security. ACM (2010)","DOI":"10.1145\/1866307.1866358"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Hoekstra, M., Lal, R., Pappachan, P., Phegade, V., Del Cuvillo, J.: Using innovative instructions to create trustworthy software solutions. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, p. 11. ACM (2013)","DOI":"10.1145\/2487726.2488370"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Holzer, A., Franz, M., Katzenbeisser, S., Veith, H.: Secure two-party computations in ANSI C. In: Proceedings of the Conference on Computer and Communications Security. ACM (2012)","DOI":"10.1145\/2382196.2382278"},{"issue":"7","key":"20_CR27","first-page":"1133","volume":"73","author":"M Kawahara","year":"1990","unstructured":"Kawahara, M.: Superdistribution: the concept and the architecture. IEICE TRANSACTIONS (1976\u20131990) 73(7), 1133\u20131146 (1990)","journal-title":"IEICE TRANSACTIONS (1976\u20131990)"},{"key":"20_CR28","unstructured":"Kreuter, B., Mood, B., Shelat, A., Butler, K.: PCF: a portable circuit format for scalable two-party secure computation. In: Proceedings of the USENIX Security Symposium (2013)"},{"key":"20_CR29","volume-title":"Ramifications of DARPA\u2019s PROCEED Program","author":"M Libicki","year":"2014","unstructured":"Libicki, M., Tkacheva, O., Feng, C., Hemenway, B.: Ramifications of DARPA\u2019s PROCEED Program. RAND, Santa Monica (2014)"},{"issue":"11","key":"20_CR30","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/356989.357005","volume":"35","author":"D Lie","year":"2000","unstructured":"Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural support for copy and tamper resistant software. ACM SIGPLAN Not. 35(11), 168\u2013177 (2000)","journal-title":"ACM SIGPLAN Not."},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Lindell, Y., Riva, B.: Blazing fast 2PC in the offline\/online setting with security for malicious adversaries. In: Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security. ACM (2015)","DOI":"10.1145\/2810103.2813666"},{"key":"20_CR32","unstructured":"Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay-a secure two-party computation system. In: Proceedings of the USENIX Security Symposium (SECURITY 2004) (2004)"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Martin, R., Demme, J., Sethumadhavan, S.: Timewarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. In: Proceedings of the 39th Annual International Symposium on Computer Architecture ISCA 2012, pp. 118\u2013129. IEEE Computer Society, Washington, DC (2012)","DOI":"10.1109\/ISCA.2012.6237011"},{"key":"20_CR34","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/1357010.1352625","volume":"42","author":"JM McCune","year":"2008","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. ACM SIGOPS Oper. Syst. Rev. 42, 315\u2013328 (2008)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Mood, B., Gupta, D., Butler, K., Feigenbaum, J.: Reuse it or lose it: more efficient secure computation through reuse of encrypted values. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2014)","DOI":"10.1145\/2660267.2660285"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Mood, B., Gupta, D., Carter, H., Butler, K., Traynor, P.: Frigate: a validated, extensible, and efficient compiler and interpreter for secure computation. In: Proceedings of the 1st IEEE European Symposium on Security and Privacy (2016)","DOI":"10.1109\/EuroSP.2016.20"},{"key":"20_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/978-3-642-32946-3_19","volume-title":"Financial Cryptography and Data Security","author":"B Mood","year":"2012","unstructured":"Mood, B., Letaw, L., Butler, K.: Memory-efficient garbled circuit generation for mobile devices. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 254\u2013268. Springer, Heidelberg (2012)"},{"key":"20_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"20_CR39","doi-asserted-by":"crossref","unstructured":"Owusu, E., Guajardo, J., McCune, J., Newsome, J., Perrig, A., Vasudevan, A.: OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2508859.2516678"},{"key":"20_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1007\/978-3-319-10879-7_22","volume-title":"Security and Cryptography for Networks","author":"J Perry","year":"2014","unstructured":"Perry, J., Gupta, D., Feigenbaum, J., Wright, R.N.: Systematizing secure computation for research and decision support. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 380\u2013397. Springer, Heidelberg (2014)"},{"key":"20_CR41","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/2654822.2541949","volume":"42","author":"N Santos","year":"2014","unstructured":"Santos, N., Raj, H., Saroiu, S., Wolman, A.: Using arm trustzone to build a trusted language runtime for mobile applications. ACM SIGARCH Comput. Archit. News 42, 67\u201380 (2014)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"20_CR42","doi-asserted-by":"crossref","unstructured":"Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar-Ruiz, G., Russinovich, M.: Vc 3: trustworthy data analytics in the cloud using SGX. In: 36th IEEE Symposium on Security and Privacy - S & P 2015. IEEE, New York (2015)","DOI":"10.1109\/SP.2015.10"},{"key":"20_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/978-3-642-20465-4_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Shelat","year":"2011","unstructured":"Shelat, A., Shen, C.: Two-output secure computation with malicious adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386\u2013405. Springer, Heidelberg (2011)"},{"issue":"8","key":"20_CR44","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"SW Smith","year":"1999","unstructured":"Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Comput. Netw. 31(8), 831\u2013860 (1999)","journal-title":"Comput. Netw."},{"key":"20_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1007\/978-3-540-45238-6_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"F-X Standaert","year":"2003","unstructured":"Standaert, F.-X., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: Efficient implementation of Rijndael encryption in reconfigurable hardware: improvements and design tradeoffs. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 334\u2013350. Springer, Heidelberg (2003)"},{"key":"20_CR46","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path oram: an extremely simple oblivious RAM protocol. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 299\u2013310. ACM (2013)","DOI":"10.1145\/2508859.2516660"},{"key":"20_CR47","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Clarke, D., Gassend, B., Van Dijk, M., Devadas, S.: Aegis: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th Annual International Conference on Supercomputing, pp. 160\u2013171. ACM (2003)","DOI":"10.1145\/782814.782838"},{"key":"20_CR48","unstructured":"Vipindeep, V., Jalote, P.: List of common bugs and programming practices to avoid them (2005)"},{"key":"20_CR49","doi-asserted-by":"crossref","unstructured":"Winter, J.: Trusted computing building blocks for embedded Linux-based arm trustzone platforms. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, pp. 21\u201330. ACM (2008)","DOI":"10.1145\/1456455.1456460"},{"key":"20_CR50","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS 1982) (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T10:55:24Z","timestamp":1657191324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}