Skip to main content

Showing 1–2 of 2 results for author: Jepsen, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.03550  [pdf, other

    cs.CR

    Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware

    Authors: Jules Drean, Fisher Jepsen, Edward Suh, Srini Devadas, Aamer Jaleel, Gururaj Saileshwar

    Abstract: We present Argos, a simple approach for adding verifiability to fully homomorphic encryption (FHE) schemes using trusted hardware. Traditional approaches to verifiable FHE require expensive cryptographic proofs, which incur an overhead of up to seven orders of magnitude on top of FHE, making them impractical. With Argos, we show that trusted hardware can be securely used to provide verifiability… ▽ More

    Submitted 24 March, 2025; v1 submitted 4 December, 2024; originally announced December 2024.

  2. arXiv:2306.14882  [pdf, other

    cs.CR cs.AR

    Citadel: Simple Spectre-Safe Isolation For Real-World Programs That Share Memory

    Authors: Jules Drean, Miguel Gomez-Garcia, Fisher Jepsen, Thomas Bourgeat, Srinivas Devadas

    Abstract: Transient execution side-channel attacks, such as Spectre, have been shown to break almost all isolation primitives. We introduce a new security property we call relaxed microarchitectural isolation (RMI) that allows sensitive programs that are not-constant-time to share memory with an attacker while restricting the information leakage to that of non-speculative execution. Although this type of sp… ▽ More

    Submitted 6 February, 2025; v1 submitted 26 June, 2023; originally announced June 2023.