Nimble: rollback protection for confidential cloud services

S Angel, A Basu, W Cui, T Jaeger, S Lau… - … USENIX Symposium on …, 2023 - usenix.org
This paper introduces Nimble, a cloud service that helps applications running in trusted
execution environments (TEEs) to detect rollback attacks (ie, detect whether a data item …

Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability

H Howard, F Alder, E Ashton, A Chamayou… - arXiv preprint arXiv …, 2023 - arxiv.org
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …

Ensuring state continuity for confidential computing: a blockchain-based approach

W Peng, X Li, J Niu, X Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Public cloud platforms have employed Trusted Execution Environment (TEE) technology to
provide confidential computing services. However, applications running on cloud TEEs are …

Survey of research on confidential computing

D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …

Sok: X-assisted bft consensus protocols

G Wang, M Nixon - International Conference on Blockchain, 2023 - Springer
Blockchain, as an enabler of the current Internet infrastructure, has introduced a plethora of
unique features, revolutionizing distributed systems and propelling us into a new era. Its …

Trust-DETM: Distributed Energy Trading Model Based on Trusted Execution Environment

X Lu, H Guo - Mathematics, 2023 - mdpi.com
The traditional centralized power trading model suffers from high maintenance costs, low
processing efficiency and unsynchronized information, and it cannot adapt to the high …

Confidential Federated Computations

H Eichner, D Ramage, K Bonawitz, D Huba… - arXiv preprint arXiv …, 2024 - arxiv.org
Federated Learning and Analytics (FLA) have seen widespread adoption by technology
platforms for processing sensitive on-device data. However, basic FLA systems have privacy …

Nimble: Rollback protection for confidential cloud services (extended version)

S Angel, A Basu, W Cui, T Jaeger, S Lau… - Cryptology ePrint …, 2023 - eprint.iacr.org
This paper introduces Nimble, a cloud service that helps applications running in trusted
execution environments (TEEs) to detect rollback attacks (ie, detect whether a data item …

Secret Key Recovery in a Global-Scale End-to-End Encryption System

G Connell, V Fang, R Schmidt, E Dauterman… - Cryptology ePrint …, 2024 - eprint.iacr.org
End-to-end encrypted messaging applications ensure that an attacker cannot read a user's
message history without their decryption keys. While end-to-end encryption provides strong …

Formally Verifying a Rollback-Prevention Protocol for TEEs

W Wang, J Niu, MK Reiter, Y Zhang - International Conference on Formal …, 2024 - Springer
Formal verification of distributed protocols is challenging and usually requires great human
effort. Ivy, a state-of-the-art formal verification tool for modeling and verifying distributed …