Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Chex-mix: Combining homomorphic encryption with trusted execution environments for two-party oblivious inference in the cloud

D Natarajan, A Loveless, W Dai… - Cryptology ePrint …, 2021 - eprint.iacr.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable
applications. But, there exists an underlying tension: users wish to keep their data private …

VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems

L Coppolino, S D'Antonio, V Formicola… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Protecting data-in-use from privileged attackers is challenging. New CPU extensions
(notably: Intel SGX) and cryptographic techniques (specifically: Homomorphic Encryption) …

Computational operations in enclave computing environments

EA Williams, R Carr - US Patent 10,902,133, 2021 - Google Patents
Methods and systems for performing a computational opera tion on a server host are
provided. Exemplary methods include: receiving an encrypted service request from a client …

Gps: Integration of graphene, palisade, and sgx for large-scale aggregations of distributed data

J Takeshita, C McKechney, J Pajak… - Cryptology ePrint …, 2021 - eprint.iacr.org
Secure computing methods such as fully homomorphic encryption and hardware solutions
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …

CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud

D Natarajan, A Loveless, W Dai… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Data, when coupled with state-of-the-art machine learning models, can enable remarkable
applications. But, there exists an underlying tension: users wish to keep their data private …

SafeLib: a Comprehensive Framework for Secure Outsourcing of Network Functions

E Marku, C Boyd, G Biczók - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
Outsourcing virtual network functions (VNFs) to third-party service providers, such as public
clouds, has become the norm. While outsourcing brings many benefits, including scalability …

[HTML][HTML] TFHE-rs: A library for safe and secure remote computing using fully homomorphic encryption and trusted execution environments

L Brenna, IS Singh, HD Johansen, D Johansen - Array, 2022 - Elsevier
Abstract Fully Homomorphic Encryption (FHE) and Trusted Execution Environ-ments (TEEs)
are complementing approaches that can both secure computa-tions running remotely on a …

[PDF][PDF] Safe and secure outsourced computing with fully homomorphic encryption and trusted execution environments

IS Singh - Master's thesis, UiT Norges arktiske universitet, 2020 - munin.uit.no
Increases in data production and growing demands for more computing power leads to the
current trend of outsourcing data and computation services to cloud providers. With data …

The Alliance of HE and TEE to Enhance their Performance and Security

S d'Antonio, G Lazarou, G Mazzeo… - … on Cyber Security …, 2023 - ieeexplore.ieee.org
While protection of data at-rest and data in-transit can be achieved using standard
algorithms and technologies, the protection of data in-use is still, to a large extent, an open …