Entry Date:
January 29, 2016

The Ascend Secure Processor

Principal Investigator Srinivas Devadas


Outsourcing computation to the cloud has a difficult set of privacy challenges, a primary one being that the client cannot really trust cloud or application software. Encrypted
computation achieves privacy by having the user specify encrypted inputs to a program in the cloud and returning encrypted results.Through innovations in architectural mechanisms, security protocols, and applied cryptography, we hope to show that it is viable to only trust hardware and not trust any software in some security-conscious applications, thereby substantially minimizing the trusted computing base for these applications.