As an essential technology underpinning trusted computing, the trusted execution environment (TEE) allows one to launch computation tasks on both on- and off-premises data while assuring confidentiality and integrity. This article provides a systematic review and comparison of TEE-based secure computation protocols. We first propose a taxonomy that classifies secure computation protocols into three major categories, namely secure outsourced computation, secure distributed computation and secure multi-party computation. To enable a fair comparison of these protocols, we also present comprehensive assessment criteria with respect to four aspects: setting, methodology, security and performance. Based on these criteria, we review, discuss and compare the state-of-the-art TEE-based secure computation protocols for both general-purpose computation functions and special-purpose ones, such as privacy-preserving machine learning and encrypted database queries. To the best of our knowledge, this article is the first survey to review TEE-based secure computation protocols and the comprehensive comparison can serve as a guideline for selecting suitable protocols for deployment in practice. Finally, we also discuss several future research directions and challenges.
翻译:作为支持可信赖计算的基本技术,可信赖的执行环境(TEE)允许人们在确保保密和完整性的同时,就现场和非现场数据启动计算任务,同时对基于TEE的安全计算规程进行系统审查和比较;我们首先提议一个分类法,将安全的计算规程分为三大类,即安全的外包计算、安全的分布计算和安全的多方计算;为了能够对这些规程进行公平的比较,我们还就四个方面提出全面评估标准:设置、方法、安全和性能。根据这些标准,我们审查、讨论和比较基于最新技术EE的基于通用计算功能和特殊目的的计算规程,例如保密机学习和加密数据库查询。据我们所知,这是对基于TEE的安全计算规程和全面比较的第一次调查,可以作为选择适当规程供实际应用的指导方针。最后,我们还讨论了若干未来研究方向和挑战。