An efficient and secure scheme of verifiable computation for Intel SGX

 October 10, 2022 at 2:56 pm

Paper

Attack: Function (Call) sequence can be modified by an untrusted attacker.

Solution: hash chain built by trusted functions, which can be verified by the user.

Not a very interesting paper.