Obliv-C is a simple GCC wrapper that makes it easy to embed secure computation protocols inside regular C programs.
The idea is simple: if you are performing a multi-party distributed computation with sensitive data, just write it in our Obliv-C langauge and compile/link it with your project. The result will be a secure multi-party cryptographic protocol that performs this operation without revealing any of the inputs or intermediate values of the computation to any of the parties. Only the final outputs are revealed.
This paper motivates and describes Obliv-C:
Samee Zahur and David Evans. Obliv-C: A Language for Extensible Data-Oblivious Computation, Cryptology ePrint Archive: Report 2015:1153 [PDF], November 2015.
This repository includes the implementation of Obliv-C and several example applications and benchmarks.
Walks through how to install Obliv-C and build your first data-oblivious application using a simple linear regression example application.
Documentation on Obliv-C’s language extensions and library functions.
Projects Using Obliv-C
Libraries and Protocols
Samee Zahur, Mike Rosulek, and David Evans. Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates. In EuroCrypt 2015. Sofia, Bulgaria. 26-30 April 2015. [PDF, 28 pages] [Code]
Samee Zahur, Xiao Wang, Mariana Raykova, Adrià Gascón, Jack Doerner, David Evans, Jonathan Katz. Revisiting Square-Root ORAM Efficient Random Access in Multi-Party Computation In 37th IEEE Symposium on Security and Privacy (“Oakland”). San Jose, CA. 23-25 May 2016.
Jack Doerner. Library of oblivious implementations of cryptographic primitives implemented in Obliv-C. Includes big integer math, hash functions, sorting, graph algorithms, oblivious data structures, and ORAM implementations. [Code: https://bitbucket.org/jackdoerner/absentminded-crypto-kit]
Adrià Gascón and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans. In Privacy Enhancing Technologies Symposium (PETS). Minneapolis, Minnesota, 18 – 21 July 2017. [PDF]
Lu Tian, Bargav Jayaraman, Quanquan Gu, and David Evans. Aggregating Private Sparse Learning Models Using Multi-Party Computation. In Private Multi‑Party Machine Learning (NIPS 2016 Workshop), Barcelona, 9 December 2016. [PDF]
Jack Doerner, David Evans, abhi shelat. Secure Stable Matching at Scale. In 23rd ACM Conference on Computer and Communications Security (CCS). Vienna, Austria. 24-28 October 2016. [PDF]
Secure Deep Learning
Bargav Jayaraman (Accenture Technology Labs, Bangalore → now at UVA)
Applications Built with Obliv-C by Others
Pretzel: Email encryption and provider-supplied functions are compatible, Trinabh Gupta, Henrique Fingler, Lorenzo Alvisi, and Michael Walfish. ACM SIGCOMM 2017.
SECCOMP - The Secure Spreadsheet, Calctopia, 2017.
David Evans. Secure Multi-Party Computation: Promises, Protocols, and Practicalities. ECRYPT NET Workshop on Crypto for the Cloud & Implementation, Paris, France, 27 June 2017. [Speaker Deck]
David Evans and Denis Nekipelov. Private Data Analysis using Multi-Party Computation. Federal Trade Commission (joint presentation), 18 August 2016.
David Evans. From Mercury Delay Lines to Magnetic Core Memories: Progress in Oblivious Memories. Workshop on Theory and Practice of Secure Multiparty Computation, Aarhus University, Denmark. 1 June 2016. [Speaker Deck]
Samee Zahur. Obliv-C: A Simple C Extension for SMC, iDash Privacy & Security Workshop 2015. (Won award for fasted “Hamming Distance” execution.)
David Evans. Multi-Party Computation for the Masses (includes video). CROSSING Conference 2015: Where Quantum Physics, Cryptography, System Security and Software Engineering Meet. Darmstadt. 1 June 2015
Samee Zahur. Obliv-C: A Lightweight Compiler for Data-Oblivious Computation (includes video). Applied Multi-Party Computation. Microsoft Research, Redmond, WA. 20 February 2014.
Samee Zahur, Project Founder and Leader (now at Google)