CCS 2017 - Papers on Secure and verifiable computation
Secure and verifiable computation
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
(University College London), (University College London), (Masaryk University), (EnigmaBridge), (EnigmaBridge), (University College London)
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
(Oregon State University / Galois, Inc.), (Galois, Inc.), (Yale University)
Full accounting for verifiable outsourcing
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
(Bell Labs), (Aarhus University), (Oregon State University), (Oregon State University), (Aarhus University)
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation
Malicious-Secure Private Set Intersection via Dual Execution
A Comprehensive Symbolic Analysis of TLS 1.3
(University of Oxford), (The Max Planck Institute For Software Systems), (Royal Holloway, University of London), (Royal Holloway, University of London), (Royal Holloway, University of London)
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
(Direction Générale de l’Armement - Maitrise de l’Information / Université de Rennes 1), (Royal Holloway, University of London), (Microsoft Research, Cambridge)
A Fast and Verified Software Stack for Secure Function Evaluation
(HASLab – INESC TEC / Universidade do Minho), (HASLab – INESC TEC / DCC FC Universidade do Porto), (IMDEA Software Institute), (University of Surrey), (INRIA Sophia-Antipolis), (IMDEA Software Institute), (HASLab – INESC TEC / DCC FC Universidade do Porto)
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
(Newcastle University), (Newcastle University), (Newcastle University), (Newcastle University), (Newcastle University)
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
(University of Maryland), (University of Maryland / George Mason University), (University of Maryland)
Fast Private Set Intersection from Homomorphic Encryption
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
Iron: Functional Encryption using Intel SGX
Scaling ORAM for Secure Computation
(Northeastern University), (Northeastern University)
Verified Correctness and Security of mbedTLS HMAC-DRBG
(Princeton University / Carnegie Mellon University), (Johns Hopkins University), (Princeton University), (Princeton University), (Oracle), (Princeton University)
Implementing BP-Obfuscation Using Graph-Induced Encoding
Global-Scale Secure Multiparty Computation
(University of Maryland), (University of Maryland / George Mason University), (University of Maryland)
Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage
Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
(City College of New York), (City College of New York), (Princeton University), (IMDEA Software Institute and Universidad Politécnica de Madrid)
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
(Bell Labs), (Bar-Ilan University), (Bar-Ilan University), (Oregon State University), (Oregon State University)
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards
A Formal Foundation for Secure Remote Execution of Enclaves
(University of California, Berkeley), (University of California, Berkeley), (Massachusetts Institute of Technology), (Massachusetts Institute of Technology), (University of California, Berkeley)