SLIDE 1
Hardware Enclaves
2
A trusted component in an untrusted system
- Protected memory isolates enclave from compromised OS
Untrusted System Enclave
- Data
- Secrets
Adversary who controls OS still can’t see inside enclave
Post-Quantum EPID Signatures from Symmetric Primitives Dan Boneh - - PowerPoint PPT Presentation
Post-Quantum EPID Signatures from Symmetric Primitives Dan Boneh Saba Eskandarian Ben Fisch Hardware Enclaves A trusted component in an untrusted system Protected memory isolates enclave from compromised OS Untrusted System Enclave
2
Adversary who controls OS still can’t see inside enclave
3
Attestation/ Communication
Adversary who controls OS still can’t see inside enclave
4
Attestation/ Communication
Adversary who controls OS still can’t see inside enclave
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
28
29
29
30
31
32
Similar to post-quantum Ring signatures of Derler et al [DRS17]
33