메뉴 건너뛰기




Volumn , Issue , 2013, Pages 207-218

Data-oblivious graph algorithms for secure computation and outsourcing

Author keywords

graph algorithms; oblivious execution; secure computation

Indexed keywords

ASYMPTOTIC COMPLEXITY; BREADTH-FIRST SEARCH; DATA-OBLIVIOUS ALGORITHMS; GRAPH ALGORITHMS; GRAPH PROBLEMS; MINIMUM SPANNING TREES; OBLIVIOUS EXECUTION; SECURE COMPUTATION;

EID: 84877998963     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484341     Document Type: Conference Paper
Times cited : (83)

References (41)
  • 1
    • 77954755618 scopus 로고    scopus 로고
    • Oblivious RAMs without cryptographic assumptions
    • M. Ajtai. Oblivious RAMs without cryptographic assumptions. In STOC, pages 181-190, 2010.
    • (2010) STOC , pp. 181-190
    • Ajtai, M.1
  • 2
    • 0036038481 scopus 로고    scopus 로고
    • Cache-oblivious priority queue and graph algorithm applications
    • L. Arge, M. Bender, E. Demaine, B. Holland-Minkley, and J. Munro. Cache-oblivious priority queue and graph algorithm applications. In STOC, pages 268-276, 2002.
    • (2002) STOC , pp. 268-276
    • Arge, L.1    Bender, M.2    Demaine, E.3    Holland-Minkley, B.4    Munro, J.5
  • 4
    • 84867646569 scopus 로고    scopus 로고
    • Private outsourcing of matrix multiplication over closed semi-rings
    • M. Atallah, K. Frikken, and S. Wang. Private outsourcing of matrix multiplication over closed semi-rings. In SECRYPT, pages 136-144, 2012.
    • (2012) SECRYPT , pp. 136-144
    • Atallah, M.1    Frikken, K.2    Wang, S.3
  • 5
    • 84871961298 scopus 로고    scopus 로고
    • Private and oblivious set and multiset operations
    • M. Blanton and E. Aguiar. Private and oblivious set and multiset operations. In ASIACCS, 2012.
    • (2012) ASIACCS
    • Blanton, M.1    Aguiar, E.2
  • 6
    • 84865590663 scopus 로고    scopus 로고
    • Secure and efficient outsourcing of sequence comparisons
    • M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi. Secure and efficient outsourcing of sequence comparisons. In ESORICS, pages 505-522, 2012.
    • (2012) ESORICS , pp. 505-522
    • Blanton, M.1    Atallah, M.2    Frikken, K.3    Malluhi, Q.4
  • 8
    • 33646793331 scopus 로고    scopus 로고
    • Privacy-preserving graph algorithms in the semi-honest model
    • J. Brickell and V. Shmatikov. Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT, pages 236-252, 2005.
    • (2005) ASIACRYPT , pp. 236-252
    • Brickell, J.1    Shmatikov, V.2
  • 9
    • 33244496122 scopus 로고    scopus 로고
    • Cache-oblivious algorithms and data structures
    • G. Brodal. Cache-oblivious algorithms and data structures. In SWAT, pages 3-13, 2004.
    • (2004) SWAT , pp. 3-13
    • Brodal, G.1
  • 10
    • 35048892533 scopus 로고    scopus 로고
    • Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths
    • G. Brodal, R. Fagerberg, U. Meyer, and N. Zeh. Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths. In SWAT, pages 480-492, 2004.
    • (2004) SWAT , pp. 480-492
    • Brodal, G.1    Fagerberg, R.2    Meyer, U.3    Zeh, N.4
  • 11
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylog communication
    • C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylog communication. In EUROCRYPT, pages 402-414, 1999.
    • (1999) EUROCRYPT , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 12
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 13
    • 77958074910 scopus 로고    scopus 로고
    • Improved primitives for secure multiparty integer computation
    • O. Catrina and S. de Hoogh. Improved primitives for secure multiparty integer computation. In SCN, pages 182-199, 2010.
    • (2010) SCN , pp. 182-199
    • Catrina, O.1    De Hoogh, S.2
  • 17
    • 79953223285 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • I. Damgård, S. Meldgaard, and J. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, pages 144-163, 2011.
    • (2011) TCC , pp. 144-163
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.3
  • 18
    • 78650606457 scopus 로고    scopus 로고
    • Privacy-preserving data-oblivious geometric algorithms for geographic data
    • D. Eppstein, M. Goodrich, and R. Tamassia. \Privacy-preserving data-oblivious geometric algorithms for geographic data. In GIS, pages 13-22, 2010.
    • (2010) GIS , pp. 13-22
    • Eppstein, D.1    Goodrich, M.2    Tamassia, R.3
  • 20
    • 79952057596 scopus 로고    scopus 로고
    • Heuristic search in encrypted graphs
    • P. Failla. Heuristic search in encrypted graphs. In SECURWARE, pages 82-87, 2010.
    • (2010) SECURWARE , pp. 82-87
    • Failla, P.1
  • 22
    • 26444512068 scopus 로고    scopus 로고
    • Single-database private information retrieval with constant communication rate
    • C. Gentry and Z. Ramzan. Single-database private information retrieval with constant communication rate. In ICALP, pages 803-815, 2005.
    • (2005) ICALP , pp. 803-815
    • Gentry, C.1    Ramzan, Z.2
  • 23
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, pages 182-194, 1987.
    • (1987) STOC , pp. 182-194
    • Goldreich, O.1
  • 24
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996. (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 25
    • 77951692170 scopus 로고    scopus 로고
    • Randomized Shellsort: A simple oblivious sorting algorithm
    • M. Goodrich. Randomized Shellsort: A simple oblivious sorting algorithm. In SODA, pages 1262-1277, 2010.
    • (2010) SODA , pp. 1262-1277
    • Goodrich, M.1
  • 26
    • 79959681766 scopus 로고    scopus 로고
    • Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
    • M. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In SPAA, pages 379-388, 2011.
    • (2011) SPAA , pp. 379-388
    • Goodrich, M.1
  • 27
    • 79960005023 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • M. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, pages 576-587, 2011.
    • (2011) ICALP , pp. 576-587
    • Goodrich, M.1    Mitzenmacher, M.2
  • 29
    • 84860181777 scopus 로고    scopus 로고
    • On the (in) security of hash-based oblivious RAM and a new balancing scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in) security of hash-based oblivious RAM and a new balancing scheme. In SODA, pages 143-156, 2012.
    • (2012) SODA , pp. 143-156
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 30
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In FOCS, pages 364-373, 1997.
    • (1997) FOCS , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 31
    • 33645970169 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared total communication
    • H. Lipmaa. An oblivious transfer protocol with log-squared total communication. In Information Security Conference (ISC), pages 314-328, 2005.
    • (2005) Information Security Conference (ISC) , pp. 314-328
    • Lipmaa, H.1
  • 32
    • 84863471916 scopus 로고    scopus 로고
    • Shortest path computation with no information leakage
    • K. Mouratidis and M. Yiu. Shortest path computation with no information leakage. VLDB Endowment, 5(8):692-703, 2012.
    • (2012) VLDB Endowment , vol.5 , Issue.8 , pp. 692-703
    • Mouratidis, K.1    Yiu, M.2
  • 33
    • 0025154732 scopus 로고
    • Efficient computation on oblivious RAMs
    • R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, pages 514-523, 1990.
    • (1990) STOC , pp. 514-523
    • Ostrovsky, R.1
  • 34
    • 77957007201 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • B. Pinkas and T. Reinman. Oblivious RAM revisited. In CRYPTO, pages 502-519, 2010.
    • (2010) CRYPTO , pp. 502-519
    • Pinkas, B.1    Reinman, T.2
  • 35
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 38
    • 33750268079 scopus 로고    scopus 로고
    • Private information retrieval using trusted hardware
    • S. Wang, X. Ding, R. Deng, and F. Bao. Private information retrieval using trusted hardware. In ESORICS, pages 49-64, 2006.
    • (2006) ESORICS , pp. 49-64
    • Wang, S.1    Ding, X.2    Deng, R.3    Bao, F.4
  • 40
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In CCS, pages 139-148, 2008.
    • (2008) CCS , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 41
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao. How to generate and exchange secrets. In FOCS, pages 162-167, 1986.
    • (1986) FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.