메뉴 건너뛰기




Volumn 25, Issue , 2014, Pages 554-565

Data-oblivious data structures

Author keywords

Data oblivious algorithms; Data oblivious data structures; Oblivious RAM; Secure cloud computing; Secure multi party computation

Indexed keywords

CLOUD COMPUTING; DATA STRUCTURES; RANDOM ACCESS STORAGE;

EID: 84907811852     PISSN: 18688969     EISSN: None     Source Type: Book    
DOI: 10.4230/LIPIcs.STACS.2014.554     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 1
    • 80052013044 scopus 로고    scopus 로고
    • Making branching programs oblivious requires superlogarithmic overhead
    • IEEE Computer Society
    • Paul Beame and Widad Machmouchi. Making branching programs oblivious requires superlogarithmic overhead. In IEEE Conference on Computational Complexity, pages 12-22. IEEE Computer Society, 2011.
    • (2011) IEEE Conference on Computational Complexity , pp. 12-22
    • Beame, P.1    Machmouchi, W.2
  • 2
    • 79953211647 scopus 로고    scopus 로고
    • Making RAMs oblivious requires superlogarithmic overhead
    • Paul Beame and Widad Machmouchi. Making RAMs oblivious requires superlogarithmic overhead. ECCC, 2011.
    • (2011) ECCC
    • Beame, P.1    Machmouchi, W.2
  • 3
    • 79953223285 scopus 로고    scopus 로고
    • Perfectly secure Oblivious RAM without random oracles
    • Yuval Ishai, editor, volume 6597 of Lecture Notes in Computer Science. Springer
    • Ivan Damgård, Sigurd Meldgaard, and Jesper Buus Nielsen. Perfectly secure Oblivious RAM without random oracles. In Yuval Ishai, editor, TCC, volume 6597 of Lecture Notes in Computer Science, pages 144-163. Springer, 2011.
    • (2011) TCC , pp. 144-163
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 5
    • 0015416906 scopus 로고
    • Real-time simulation of multihead tape units
    • October
    • Patrick C. Fischer, Albert R. Meyer, and Arnold L. Rosenberg. Real-time simulation of multihead tape units. J. ACM, 19(4):590-607, October 1972.
    • (1972) J. ACM , vol.19 , Issue.4 , pp. 590-607
    • Fischer, P.C.1    Meyer, A.R.2    Rosenberg, A.L.3
  • 6
    • 84884946400 scopus 로고    scopus 로고
    • Optimizing ORAM and using it efficiently for secure computation
    • Emiliano De Cristofaro and Matthew Wright editors, volume 7981 of Lecture Notes in Computer Science. Springer
    • Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, and Daniel Wichs. Optimizing ORAM and using it efficiently for secure computation. In Emiliano De Cristofaro and Matthew Wright, editors, Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, pages 1-18. Springer, 2013.
    • (2013) Privacy Enhancing Technologies , pp. 1-18
    • Gentry, C.1    Goldman, K.A.2    Halevi, S.3    Jutla, C.S.4    Raykova, M.5    Wichs, D.6
  • 7
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • May
    • Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 43(3):431-473, May 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 9
    • 0006672480 scopus 로고
    • Two-tape simulation of multitape turing machines
    • October
    • F. C. Hennie and R. E. Stearns. Two-tape simulation of multitape turing machines. J. ACM, 13(4):533-546, October 1966.
    • (1966) J. ACM , vol.13 , Issue.4 , pp. 533-546
    • Hennie, F.C.1    Stearns, R.E.2
  • 10
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • Yuval Rabani, editor. SIAM
    • Eyal Kushilevitz, Steve Lu, and Rafail Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Yuval Rabani, editor, SODA, pages 143-156. SIAM, 2012.
    • (2012) SODA , pp. 143-156
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 11
    • 84976706686 scopus 로고
    • New real-time simulations of multihead tape units
    • January
    • Benton L. Leong and Joel I. Seiferas. New real-time simulations of multihead tape units. J. ACM, 28(1):166-180, January 1981.
    • (1981) J. ACM , vol.28 , Issue.1 , pp. 166-180
    • Leong, B.L.1    Seiferas, J.I.2
  • 14
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • October
    • Andrew C. Myers and Barbara Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, October 2000.
    • (2000) ACM Trans. Softw. Eng. Methodol , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 16
    • 0018456413 scopus 로고
    • Relations among complexity measures
    • April
    • Nicholas Pippenger and Michael J. Fischer. Relations among complexity measures. J. ACM, 26(2):361-381, April 1979.
    • (1979) J. ACM , vol.26 , Issue.2 , pp. 361-381
    • Pippenger, N.1    Fischer, M.J.2
  • 18
    • 79959864414 scopus 로고    scopus 로고
    • Secure data structures based on multi-party computation
    • Cyril Gavoille and Pierre Fraigniaud, editors. ACM
    • Tomas Toft. Secure data structures based on multi-party computation. In Cyril Gavoille and Pierre Fraigniaud, editors, PODC, pages 291-292. ACM, 2011.
    • (2011) PODC , pp. 291-292
    • Toft, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.