-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Key gen #188
base: master
Are you sure you want to change the base?
Key gen #188
Conversation
can you please add a description of the workflow? i.e. a sequence of steps that are taken during local attestation, and the functions that are called? the PR is a bit large, and this will help with understanding all the code that you've added. thanks! |
I wrote up a quick document about the steps and functions calls. I linked it in the original description, but here it is again for convenience: https://drive.google.com/file/d/1EtHdv1WbyuTk4r6OGGWCNuufK6MC6SnA/view?usp=sharing |
The goal of this part is to allow Opaque enclaves to establish a shared, secret key that is not known to any untrusted party (i.e. clients, driver, etc.). This key will be used to encrypt the intermediate results in the Spark-generated DAG (with Opaque operators).
See https://drive.google.com/file/d/1EtHdv1WbyuTk4r6OGGWCNuufK6MC6SnA/view?usp=sharing
The pull requests should be done in the following order:
Key-get -> gRPC reEncryption -> gRPC ServiceProvider -> gRPC Python Files