-
1
-
-
77954755618
-
Oblivious RAMs without cryptographic assumptions
-
M. Ajtai. Oblivious RAMs without cryptographic assumptions. In STOC, pages 181-190, 2010.
-
(2010)
STOC
, pp. 181-190
-
-
Ajtai, M.1
-
2
-
-
0036038481
-
Cache-oblivious priority queue and graph algorithm applications
-
L. Arge, M. Bender, E. Demaine, B. Holland-Minkley, and J. Munro. Cache-oblivious priority queue and graph algorithm applications. In STOC, pages 268-276, 2002.
-
(2002)
STOC
, pp. 268-276
-
-
Arge, L.1
Bender, M.2
Demaine, E.3
Holland-Minkley, B.4
Munro, J.5
-
3
-
-
38049076480
-
An optimal cache-oblivious priority queue and its application to graph algorithms
-
L. Arge, M. Bender, E. Demaine, B. Holland-Minkley, and J. Munro. An optimal cache-oblivious priority queue and its application to graph algorithms. SIAM Journal on Computing, pages 1672-1695, 2007.
-
(2007)
SIAM Journal on Computing
, pp. 1672-1695
-
-
Arge, L.1
Bender, M.2
Demaine, E.3
Holland-Minkley, B.4
Munro, J.5
-
4
-
-
84867646569
-
Private outsourcing of matrix multiplication over closed semi-rings
-
M. Atallah, K. Frikken, and S. Wang. Private outsourcing of matrix multiplication over closed semi-rings. In SECRYPT, pages 136-144, 2012.
-
(2012)
SECRYPT
, pp. 136-144
-
-
Atallah, M.1
Frikken, K.2
Wang, S.3
-
5
-
-
84871961298
-
Private and oblivious set and multiset operations
-
M. Blanton and E. Aguiar. Private and oblivious set and multiset operations. In ASIACCS, 2012.
-
(2012)
ASIACCS
-
-
Blanton, M.1
Aguiar, E.2
-
6
-
-
84865590663
-
Secure and efficient outsourcing of sequence comparisons
-
M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi. Secure and efficient outsourcing of sequence comparisons. In ESORICS, pages 505-522, 2012.
-
(2012)
ESORICS
, pp. 505-522
-
-
Blanton, M.1
Atallah, M.2
Frikken, K.3
Malluhi, Q.4
-
8
-
-
33646793331
-
Privacy-preserving graph algorithms in the semi-honest model
-
J. Brickell and V. Shmatikov. Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT, pages 236-252, 2005.
-
(2005)
ASIACRYPT
, pp. 236-252
-
-
Brickell, J.1
Shmatikov, V.2
-
9
-
-
33244496122
-
Cache-oblivious algorithms and data structures
-
G. Brodal. Cache-oblivious algorithms and data structures. In SWAT, pages 3-13, 2004.
-
(2004)
SWAT
, pp. 3-13
-
-
Brodal, G.1
-
10
-
-
35048892533
-
Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths
-
G. Brodal, R. Fagerberg, U. Meyer, and N. Zeh. Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths. In SWAT, pages 480-492, 2004.
-
(2004)
SWAT
, pp. 480-492
-
-
Brodal, G.1
Fagerberg, R.2
Meyer, U.3
Zeh, N.4
-
11
-
-
1642602228
-
Computationally private information retrieval with polylog communication
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylog communication. In EUROCRYPT, pages 402-414, 1999.
-
(1999)
EUROCRYPT
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
12
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
13
-
-
77958074910
-
Improved primitives for secure multiparty integer computation
-
O. Catrina and S. de Hoogh. Improved primitives for secure multiparty integer computation. In SCN, pages 182-199, 2010.
-
(2010)
SCN
, pp. 182-199
-
-
Catrina, O.1
De Hoogh, S.2
-
14
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In FOCS, pages 41-50, 1995.
-
(1995)
FOCS
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
15
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. Journal of the ACM, pages 965-981, 1998.
-
(1998)
Journal of the ACM
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
17
-
-
79953223285
-
Perfectly secure oblivious RAM without random oracles
-
I. Damgård, S. Meldgaard, and J. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, pages 144-163, 2011.
-
(2011)
TCC
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.3
-
18
-
-
78650606457
-
Privacy-preserving data-oblivious geometric algorithms for geographic data
-
D. Eppstein, M. Goodrich, and R. Tamassia. \Privacy-preserving data-oblivious geometric algorithms for geographic data. In GIS, pages 13-22, 2010.
-
(2010)
GIS
, pp. 13-22
-
-
Eppstein, D.1
Goodrich, M.2
Tamassia, R.3
-
19
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In CCS, pages 213-222, 2009.
-
(2009)
CCS
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
20
-
-
79952057596
-
Heuristic search in encrypted graphs
-
P. Failla. Heuristic search in encrypted graphs. In SECURWARE, pages 82-87, 2010.
-
(2010)
SECURWARE
, pp. 82-87
-
-
Failla, P.1
-
22
-
-
26444512068
-
Single-database private information retrieval with constant communication rate
-
C. Gentry and Z. Ramzan. Single-database private information retrieval with constant communication rate. In ICALP, pages 803-815, 2005.
-
(2005)
ICALP
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
-
23
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, pages 182-194, 1987.
-
(1987)
STOC
, pp. 182-194
-
-
Goldreich, O.1
-
24
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996. (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
25
-
-
77951692170
-
Randomized Shellsort: A simple oblivious sorting algorithm
-
M. Goodrich. Randomized Shellsort: A simple oblivious sorting algorithm. In SODA, pages 1262-1277, 2010.
-
(2010)
SODA
, pp. 1262-1277
-
-
Goodrich, M.1
-
26
-
-
79959681766
-
Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
-
M. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In SPAA, pages 379-388, 2011.
-
(2011)
SPAA
, pp. 379-388
-
-
Goodrich, M.1
-
27
-
-
79960005023
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
M. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, pages 576-587, 2011.
-
(2011)
ICALP
, pp. 576-587
-
-
Goodrich, M.1
Mitzenmacher, M.2
-
29
-
-
84860181777
-
On the (in) security of hash-based oblivious RAM and a new balancing scheme
-
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in) security of hash-based oblivious RAM and a new balancing scheme. In SODA, pages 143-156, 2012.
-
(2012)
SODA
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
30
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In FOCS, pages 364-373, 1997.
-
(1997)
FOCS
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
31
-
-
33645970169
-
An oblivious transfer protocol with log-squared total communication
-
H. Lipmaa. An oblivious transfer protocol with log-squared total communication. In Information Security Conference (ISC), pages 314-328, 2005.
-
(2005)
Information Security Conference (ISC)
, pp. 314-328
-
-
Lipmaa, H.1
-
32
-
-
84863471916
-
Shortest path computation with no information leakage
-
K. Mouratidis and M. Yiu. Shortest path computation with no information leakage. VLDB Endowment, 5(8):692-703, 2012.
-
(2012)
VLDB Endowment
, vol.5
, Issue.8
, pp. 692-703
-
-
Mouratidis, K.1
Yiu, M.2
-
33
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, pages 514-523, 1990.
-
(1990)
STOC
, pp. 514-523
-
-
Ostrovsky, R.1
-
34
-
-
77957007201
-
Oblivious RAM revisited
-
B. Pinkas and T. Reinman. Oblivious RAM revisited. In CRYPTO, pages 502-519, 2010.
-
(2010)
CRYPTO
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
35
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
38
-
-
33750268079
-
Private information retrieval using trusted hardware
-
S. Wang, X. Ding, R. Deng, and F. Bao. Private information retrieval using trusted hardware. In ESORICS, pages 49-64, 2006.
-
(2006)
ESORICS
, pp. 49-64
-
-
Wang, S.1
Ding, X.2
Deng, R.3
Bao, F.4
-
40
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In CCS, pages 139-148, 2008.
-
(2008)
CCS
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
41
-
-
0022882770
-
How to generate and exchange secrets
-
A. Yao. How to generate and exchange secrets. In FOCS, pages 162-167, 1986.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
|