{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:57Z","timestamp":1772725617295,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF GRFP","award":["DGE-1656518"],"award-info":[{"award-number":["DGE-1656518"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134106","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"765-782","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":82,"title":["IRON"],"prefix":"10.1145","author":[{"given":"Ben","family":"Fisch","sequence":"first","affiliation":[{"name":"Stanford University, Stanford University, CA, USA"}]},{"given":"Dhinakaran","family":"Vinayagamurthy","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Sergey","family":"Gorbunov","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Michel Abdalla Mihir Bellare and Gregory Neven. 2010. Robust Encryption TCC. 480--497.","DOI":"10.1007\/978-3-642-11799-2_28"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Shweta Agrawal Sergey Gorbunov Vinod Vaikuntanathan and Hoeteck Wee 2013. Functional Encryption: New Perspectives and Lower Bounds CRYPTO. 500--518.","DOI":"10.1007\/978-3-642-40084-1_28"},{"key":"e_1_3_2_2_3_1","volume-title":"Wilson","author":"Alwen Jo\u00ebl","year":"2013","unstructured":"Jo\u00ebl Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, and David A. Wilson 2013. On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption IMACC. 65--84."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Prabhanjan Ananth and Abhishek Jain 2015. Indistinguishability Obfuscation from Compact Functional Encryption CRYPTO I. 308--326.","DOI":"10.1007\/978-3-662-47989-6_15"},{"key":"e_1_3_2_2_5_1","unstructured":"Sergei Arnautov Bohdan Trach Franz Gregor Thomas Knauth Andre Martin Christian Priebe Joshua Lind Divya Muthukumaran Dan O'Keeffe Mark L. Stillwell David Goltzsche Dave Eyers R\u00fcdiger Kapitza Peter R. Pietzuch and Christof Fetzer 2016. SCONE: Secure Linux Containers with Intel SGX. OSDI. 689--703."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Raad Bahmani Manuel Barbosa Ferdinand Brasser Bernardo Portela Ahmad-Reza Sadeghi Guillaume Scerri and Bogdan Warinschi. 2017. Secure Multiparty Computation from SGX. In FC.","DOI":"10.1007\/978-3-319-70972-7_27"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Manuel Barbosa Bernardo Portela Guillaume Scerri and Bogdan Warinschi 2016. Foundations of Hardware-Based Attested Computation and Application to SGX EuroS&P. 245--260.","DOI":"10.1109\/EuroSP.2016.28"},{"key":"e_1_3_2_2_8_1","volume-title":"Hunt","author":"Baumann Andrew","year":"2014","unstructured":"Andrew Baumann, Marcus Peinado, and Galen C. Hunt. 2014. Shielding Applications from an Untrusted Cloud with Haven OSDI. 267--283."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Nir Bitansky and Vinod Vaikuntanathan 2015. Indistinguishability Obfuscation from Functional Encryption FOCS. 171--190.","DOI":"10.1109\/FOCS.2015.20"},{"key":"e_1_3_2_2_10_1","volume-title":"Franklin","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh and Matthew K. Franklin 2001. Identity-Based Encryption from the Weil Pairing. CRYPTO. 213--229."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366316.2366333"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134106"}},"subtitle":["Functional Encryption using Intel SGX"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":11,"alternative-id":["10.1145\/3133956.3134106","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134106","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}