![]() Information-flow Types for Homomorphic Encryptions. In Cryptology ePrint Archive, Report 2012/266. Compilation Techniques for Efficient Encrypted Computation. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. A Lattice Model of Secure Information Flow. Asynchronous Multiparty Computation: Theory and Implementation. In Electronic Colloquium on Computational Complexity, 2011. Fully Homomorphic Encryption without Bootstrapping. Targeted Malleability: Homomorphic Encryption for Restricted Computations. Public Key Encryption with Keyword Search. Encrypted Domain DCT Based on Homomorphic Cryptosystems. FairplayMP: A System for Secure Multi-party Computation. Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. Standards for the protection of personal information of residents of the commonwealth.Mcafee host intrusion prevention for server.We show that x86 code transformed with AutoCrypt achieves performance that is significantly better than its alternatives (downloading to a trusted client, or using fully-homomorphic encryption). Key to achieving this expressiveness over encrypted data, is our scheme to combine and convert between partially-homomorphic encryption (PHE) schemes using a small TCB in the trusted cloud hypervisor. We show that such a transformation is feasible for several standard Unix utilities available in a typical LAMP stack, with no developer effort. As a step towards this goal, we develop a tool called AutoCrypt, which transforms a subset of existing C functionality in the web stack to operate on encrypted sensitive content. In this context, the main challenge is to allow the legitimate functionality of the untrusted server VM to work. ![]() All sensitive web content is made available to the vulnerable server VM in encrypted form, thereby limiting the effectiveness of data-stealing attacks through server VM compromise. In this work, we investigate the feasibility of a web server architecture, wherein the vulnerable server VM runs on a trusted cloud. Web servers are vulnerable to a large class of attacks which can allow network attacker to steal sensitive web content. ![]()
0 Comments
Leave a Reply. |