메뉴 건너뛰기




Volumn 7881 LNCS, Issue , 2013, Pages 719-734

How to garble RAM programs?

Author keywords

Garbled Circuits; Oblivious RAM; Secure Computation

Indexed keywords

BINARY SEARCH; DATA SIZE; ENCRYPTED DATA; GARBLED CIRCUITS; ONE-WAY FUNCTIONS; RUNNING TIME; SECURE COMPUTATION; SECURITY PARAMETERS;

EID: 84883362941     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38348-9_42     Document Type: Conference Paper
Times cited : (83)

References (33)
  • 1
    • 77955319555 scopus 로고    scopus 로고
    • From secrecy to soundness: Efficient verification via secure computation
    • Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010 Springer, Heidelberg
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152-163. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6198 , pp. 152-163
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 2
    • 0025137207 scopus 로고
    • The round complexity of secure protocols
    • extended abstract
    • Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC, pp. 503-513 (1990)
    • (1990) STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 3
    • 84871597758 scopus 로고    scopus 로고
    • Adaptively secure garbling with applications to onetime programs and secure outsourcing
    • Wang, X., Sako, K. (eds.) ASIACRYPT 2012 Springer, Heidelberg
    • Bellare, M., Hoang, V.T., Rogaway, P.: Adaptively secure garbling with applications to onetime programs and secure outsourcing. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 134-153. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7658 , pp. 134-153
    • Bellare, M.1    Hoang, V.T.2    Rogaway, P.3
  • 5
    • 38049138213 scopus 로고    scopus 로고
    • Public key encryption that allows PIR queries
    • Menezes, A. (ed.) CRYPTO 2007 Springer, Heidelberg
    • Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public key encryption that allows PIR queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3    Skeith III, W.E.4
  • 6
    • 80955149556 scopus 로고    scopus 로고
    • Remote oblivious storage: Making oblivious RAM practical
    • MIT-CSAIL-TR-2011-018
    • Boneh, D., Mazieres, D., Popa, R.A.: Remote oblivious storage: Making oblivious RAM practical. CSAIL Technical Report, MIT-CSAIL-TR-2011-018 (2011)
    • (2011) CSAIL Technical Report
    • Boneh, D.1    Mazieres, D.2    Popa, R.A.3
  • 7
    • 77958041310 scopus 로고    scopus 로고
    • Public-key encryption with efficient amortized updates
    • Garay, J.A., De Prisco, R. (eds.) SCN 2010 Springer, Heidelberg
    • Chandran, N., Ostrovsky, R., Skeith III, W.E.: Public-key encryption with efficient amortized updates. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 17-35. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 17-35
    • Chandran, N.1    Ostrovsky, R.2    Skeith III, W.E.3
  • 8
    • 0015852657 scopus 로고
    • Cook and Robert A. Reckhow. Time bounded random access machines
    • Stephen, A.: Cook and Robert A. Reckhow. Time bounded random access machines. Journal of Computer and System Sciences 7(4), 354-375 (1973)
    • (1973) Journal of Computer and System Sciences , vol.7 , Issue.4 , pp. 354-375
    • Stephen, A.1
  • 9
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • Goldreich, O.: Towards a theory of software protection and simulation by oblivious RAMs. In: STOC, pp. 182-194 (1987)
    • (1987) STOC , pp. 182-194
    • Goldreich, O.1
  • 10
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 11
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431-473 (1996)
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 13
    • 84883386968 scopus 로고    scopus 로고
    • Goodrich and Michael Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation
    • Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II Springer, Heidelberg
    • Michael, T.: Goodrich and Michael Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576-587. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6756 , pp. 576-587
    • Michael, T.1
  • 14
    • 80955131283 scopus 로고    scopus 로고
    • Oblivious RAM simulation with efficient worst-case access overhead
    • Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Oblivious RAM simulation with efficient worst-case access overhead. In: CCSW, pp. 95-100 (2011)
    • (2011) CCSW , pp. 95-100
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 15
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious ram simulation
    • Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless oblivious ram simulation. In: SODA, pp. 157-167 (2012)
    • (2012) SODA , pp. 157-167
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 17
    • 84883328215 scopus 로고    scopus 로고
    • Personal communication
    • Ishai, Y., Kushilevitz, E.: Personal communication (2012)
    • (2012)
    • Ishai, Y.1    Kushilevitz, E.2
  • 18
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • Kushilevitz, E., Lu, S., Ostrovsky, R.: On the (in)security of hash-based oblivious RAM and a new balancing scheme. In: SODA, pp. 143-156 (2012)
    • (2012) SODA , pp. 143-156
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 19
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for two-party computation
    • Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 21
    • 84873955790 scopus 로고    scopus 로고
    • Distributed oblivious RAM for secure two-party computation
    • Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
    • Lu, S., Ostrovsky, R.: Distributed oblivious RAM for secure two-party computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 377-396. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 377-396
    • Lu, S.1    Ostrovsky, R.2
  • 22
    • 0034819509 scopus 로고    scopus 로고
    • Communication preserving protocols for secure function evaluation
    • Naor, M., Nissim, K.: Communication preserving protocols for secure function evaluation. In: STOC, pp. 590-599 (2001)
    • (2001) STOC , pp. 590-599
    • Naor, M.1    Nissim, K.2
  • 23
    • 0025154732 scopus 로고
    • Efficient computation on oblivious RAMs
    • Ostrovsky, R.: Efficient computation on oblivious RAMs. In: STOC, pp. 514-523 (1990)
    • (1990) STOC , pp. 514-523
    • Ostrovsky, R.1
  • 24
    • 34548706878 scopus 로고
    • PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science June
    • Ostrovsky, R.: Software Protection and Simulation On Oblivious RAMs. PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science (June 1992)
    • (1992) Software Protection and Simulation on Oblivious RAMs
    • Ostrovsky, R.1
  • 26
    • 77957007201 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
    • Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502-519. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 502-519
    • Pinkas, B.1    Reinman, T.2
  • 27
    • 0018456413 scopus 로고
    • Relations among complexity measures
    • Pippenger, N., Fischer, M.J.: Relations among complexity measures. J. ACM 26(2), 361-381 (1979)
    • (1979) J. ACM , vol.26 , Issue.2 , pp. 361-381
    • Pippenger, N.1    Fischer, M.J.2
  • 28
    • 82955173838 scopus 로고    scopus 로고
    • 3) Worst-case Cost
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011 Springer, Heidelberg
    • 3) Worst-case Cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197-214. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 197-214
    • Shi, E.1    Chan, T.-H.H.2    Stefanov, E.3    Li, M.4
  • 29
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • Stefanov, E., Shi, E., Song, D.: Towards practical oblivious RAM. In: NDSS (2012)
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 30
    • 84883383924 scopus 로고    scopus 로고
    • Personal Communication March
    • Wichs, D.: Personal Communication (March 2013)
    • (2013)
    • Wichs, D.1
  • 31
    • 84869381921 scopus 로고    scopus 로고
    • Single Round Access Privacy on Outsourced Storage
    • Williams, P., Sion, R.: Single Round Access Privacy on Outsourced Storage. In: ACM CCS, pp. 293-304 (2012)
    • (2012) ACM CCS , pp. 293-304
    • Williams, P.1    Sion, R.2
  • 32
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: ACM Conference on Computer and Communications Security, pp. 139-148 (2008)
    • (2008) ACM Conference on Computer and Communications Security , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 33
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • extended abstract
    • Yao, A.C.-C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160-164 (1982)
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.