-
1
-
-
77955319555
-
From secrecy to soundness: Efficient verification via secure computation
-
Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010 Springer, Heidelberg
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152-163. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6198
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
2
-
-
0025137207
-
The round complexity of secure protocols
-
extended abstract
-
Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC, pp. 503-513 (1990)
-
(1990)
STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
3
-
-
84871597758
-
Adaptively secure garbling with applications to onetime programs and secure outsourcing
-
Wang, X., Sako, K. (eds.) ASIACRYPT 2012 Springer, Heidelberg
-
Bellare, M., Hoang, V.T., Rogaway, P.: Adaptively secure garbling with applications to onetime programs and secure outsourcing. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 134-153. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7658
, pp. 134-153
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
4
-
-
84869382999
-
Foundations of garbled circuits
-
Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: ACM Conference on Computer and Communications Security, pp. 784-796 (2012)
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 784-796
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
5
-
-
38049138213
-
Public key encryption that allows PIR queries
-
Menezes, A. (ed.) CRYPTO 2007 Springer, Heidelberg
-
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public key encryption that allows PIR queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith III, W.E.4
-
6
-
-
80955149556
-
Remote oblivious storage: Making oblivious RAM practical
-
MIT-CSAIL-TR-2011-018
-
Boneh, D., Mazieres, D., Popa, R.A.: Remote oblivious storage: Making oblivious RAM practical. CSAIL Technical Report, MIT-CSAIL-TR-2011-018 (2011)
-
(2011)
CSAIL Technical Report
-
-
Boneh, D.1
Mazieres, D.2
Popa, R.A.3
-
7
-
-
77958041310
-
Public-key encryption with efficient amortized updates
-
Garay, J.A., De Prisco, R. (eds.) SCN 2010 Springer, Heidelberg
-
Chandran, N., Ostrovsky, R., Skeith III, W.E.: Public-key encryption with efficient amortized updates. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 17-35. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 17-35
-
-
Chandran, N.1
Ostrovsky, R.2
Skeith III, W.E.3
-
8
-
-
0015852657
-
Cook and Robert A. Reckhow. Time bounded random access machines
-
Stephen, A.: Cook and Robert A. Reckhow. Time bounded random access machines. Journal of Computer and System Sciences 7(4), 354-375 (1973)
-
(1973)
Journal of Computer and System Sciences
, vol.7
, Issue.4
, pp. 354-375
-
-
Stephen, A.1
-
9
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
Goldreich, O.: Towards a theory of software protection and simulation by oblivious RAMs. In: STOC, pp. 182-194 (1987)
-
(1987)
STOC
, pp. 182-194
-
-
Goldreich, O.1
-
10
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431-473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
12
-
-
84880657182
-
Succinct functional encryption and applications: Reusable garbled circuits and beyond
-
Report 2012/733
-
Goldwasser, S., Kalai, Y., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: Succinct functional encryption and applications: Reusable garbled circuits and beyond. Cryptology ePrint Archive, Report 2012/733 (2012)
-
(2012)
Cryptology EPrint Archive
-
-
Goldwasser, S.1
Kalai, Y.2
Popa, R.A.3
Vaikuntanathan, V.4
Zeldovich, N.5
-
13
-
-
84883386968
-
Goodrich and Michael Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation
-
Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II Springer, Heidelberg
-
Michael, T.: Goodrich and Michael Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576-587. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6756
, pp. 576-587
-
-
Michael, T.1
-
14
-
-
80955131283
-
Oblivious RAM simulation with efficient worst-case access overhead
-
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Oblivious RAM simulation with efficient worst-case access overhead. In: CCSW, pp. 95-100 (2011)
-
(2011)
CCSW
, pp. 95-100
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
15
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious ram simulation
-
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless oblivious ram simulation. In: SODA, pp. 157-167 (2012)
-
(2012)
SODA
, pp. 157-167
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
16
-
-
84869456660
-
Secure two-party computation in sublinear (amortized) time
-
Gordon, S.D., Katz, J., Kolesnikov, V., Krell, F., Malkin, T., Raykova, M., Vahlis, Y.: Secure two-party computation in sublinear (amortized) time. In: ACM Conference on Computer and Communications Security, pp. 513-524 (2012)
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 513-524
-
-
Gordon, S.D.1
Katz, J.2
Kolesnikov, V.3
Krell, F.4
Malkin, T.5
Raykova, M.6
Vahlis, Y.7
-
18
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
Kushilevitz, E., Lu, S., Ostrovsky, R.: On the (in)security of hash-based oblivious RAM and a new balancing scheme. In: SODA, pp. 143-156 (2012)
-
(2012)
SODA
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
19
-
-
64249101946
-
A proof of security of yao's protocol for two-party computation
-
Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
21
-
-
84873955790
-
Distributed oblivious RAM for secure two-party computation
-
Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
-
Lu, S., Ostrovsky, R.: Distributed oblivious RAM for secure two-party computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 377-396. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 377-396
-
-
Lu, S.1
Ostrovsky, R.2
-
22
-
-
0034819509
-
Communication preserving protocols for secure function evaluation
-
Naor, M., Nissim, K.: Communication preserving protocols for secure function evaluation. In: STOC, pp. 590-599 (2001)
-
(2001)
STOC
, pp. 590-599
-
-
Naor, M.1
Nissim, K.2
-
23
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
Ostrovsky, R.: Efficient computation on oblivious RAMs. In: STOC, pp. 514-523 (1990)
-
(1990)
STOC
, pp. 514-523
-
-
Ostrovsky, R.1
-
24
-
-
34548706878
-
-
PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science June
-
Ostrovsky, R.: Software Protection and Simulation On Oblivious RAMs. PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science (June 1992)
-
(1992)
Software Protection and Simulation on Oblivious RAMs
-
-
Ostrovsky, R.1
-
26
-
-
77957007201
-
Oblivious RAM revisited
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502-519. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
27
-
-
0018456413
-
Relations among complexity measures
-
Pippenger, N., Fischer, M.J.: Relations among complexity measures. J. ACM 26(2), 361-381 (1979)
-
(1979)
J. ACM
, vol.26
, Issue.2
, pp. 361-381
-
-
Pippenger, N.1
Fischer, M.J.2
-
28
-
-
82955173838
-
3) Worst-case Cost
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011 Springer, Heidelberg
-
3) Worst-case Cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197-214. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
29
-
-
85180805635
-
Towards practical oblivious RAM
-
Stefanov, E., Shi, E., Song, D.: Towards practical oblivious RAM. In: NDSS (2012)
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
30
-
-
84883383924
-
-
Personal Communication March
-
Wichs, D.: Personal Communication (March 2013)
-
(2013)
-
-
Wichs, D.1
-
31
-
-
84869381921
-
Single Round Access Privacy on Outsourced Storage
-
Williams, P., Sion, R.: Single Round Access Privacy on Outsourced Storage. In: ACM CCS, pp. 293-304 (2012)
-
(2012)
ACM CCS
, pp. 293-304
-
-
Williams, P.1
Sion, R.2
-
32
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: ACM Conference on Computer and Communications Security, pp. 139-148 (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
33
-
-
0020312165
-
Protocols for secure computations
-
extended abstract
-
Yao, A.C.-C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160-164 (1982)
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
|