Nimble: rollback protection for confidential cloud services
This paper introduces Nimble, a cloud service that helps applications running in trusted
execution environments (TEEs) to detect rollback attacks (ie, detect whether a data item …
execution environments (TEEs) to detect rollback attacks (ie, detect whether a data item …
Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …
properties for trustworthy data systems. The rise of cloud computing and the growing …
Ensuring state continuity for confidential computing: a blockchain-based approach
Public cloud platforms have employed Trusted Execution Environment (TEE) technology to
provide confidential computing services. However, applications running on cloud TEEs are …
provide confidential computing services. However, applications running on cloud TEEs are …
Survey of research on confidential computing
D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …
more rapidly, the demand for data security and privacy protection has become increasingly …
Sok: X-assisted bft consensus protocols
G Wang, M Nixon - International Conference on Blockchain, 2023 - Springer
Blockchain, as an enabler of the current Internet infrastructure, has introduced a plethora of
unique features, revolutionizing distributed systems and propelling us into a new era. Its …
unique features, revolutionizing distributed systems and propelling us into a new era. Its …
Trust-DETM: Distributed Energy Trading Model Based on Trusted Execution Environment
X Lu, H Guo - Mathematics, 2023 - mdpi.com
The traditional centralized power trading model suffers from high maintenance costs, low
processing efficiency and unsynchronized information, and it cannot adapt to the high …
processing efficiency and unsynchronized information, and it cannot adapt to the high …
Confidential Federated Computations
Federated Learning and Analytics (FLA) have seen widespread adoption by technology
platforms for processing sensitive on-device data. However, basic FLA systems have privacy …
platforms for processing sensitive on-device data. However, basic FLA systems have privacy …
Nimble: Rollback protection for confidential cloud services (extended version)
This paper introduces Nimble, a cloud service that helps applications running in trusted
execution environments (TEEs) to detect rollback attacks (ie, detect whether a data item …
execution environments (TEEs) to detect rollback attacks (ie, detect whether a data item …
Secret Key Recovery in a Global-Scale End-to-End Encryption System
G Connell, V Fang, R Schmidt, E Dauterman… - Cryptology ePrint …, 2024 - eprint.iacr.org
End-to-end encrypted messaging applications ensure that an attacker cannot read a user's
message history without their decryption keys. While end-to-end encryption provides strong …
message history without their decryption keys. While end-to-end encryption provides strong …
Formally Verifying a Rollback-Prevention Protocol for TEEs
Formal verification of distributed protocols is challenging and usually requires great human
effort. Ivy, a state-of-the-art formal verification tool for modeling and verifying distributed …
effort. Ivy, a state-of-the-art formal verification tool for modeling and verifying distributed …