-
3
-
-
84889037522
-
-
arXiv preprint arXiv:1307.3699
-
K.-M. Chung, Z. Liu, and R. Pass. Statistically-secure oram with O(log2 n) overhead. arXiv preprint arXiv:1307.3699, 2013.
-
(2013)
2 N) Overhead
-
-
Chung, K.-M.1
Liu, Z.2
Pass, R.3
-
4
-
-
82955204091
-
Perfectly secure oblivious RAM without random oracles
-
I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, 2011.
-
(2011)
TCC
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
5
-
-
84881225045
-
A secure processor architecture for encrypted computation on untrusted programs
-
C. W. Fletcher, M. v. Dijk, and S. Devadas. A secure processor architecture for encrypted computation on untrusted programs. In STC, 2012.
-
(2012)
STC
-
-
Fletcher, C.W.1
Dijk M, V.2
Devadas, S.3
-
6
-
-
84907816512
-
Optimizing ORAM and using it efficiently for secure computation
-
C. Gentry, K. A. Goldman, S. Halevi, C. S. Jutla, M. Raykova, and D. Wichs. Optimizing ORAM and using it efficiently for secure computation. In Privacy Enhancing Technologies Symposium (PETS), 2013.
-
(2013)
Privacy Enhancing Technologies Symposium (PETS
-
-
Gentry, C.1
Goldman, K.A.2
Halevi, S.3
Jutla, C.S.4
Raykova, M.5
Wichs, D.6
-
7
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
-
(1987)
STOC
-
-
Goldreich, O.1
-
9
-
-
84881228714
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011.
-
(2011)
ICALP
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
11
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA, 2012.
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
12
-
-
84869456660
-
Secure two-party computation in sublinear (amortized) time
-
S. D. Gordon, J. Katz, V. Kolesnikov, F. Krell, T. Malkin, M. Raykova, and Y. Vahlis. Secure two-party computation in sublinear (amortized) time. In CCS, pages 513-524, 2012.
-
(2012)
CCS
, pp. 513-524
-
-
Gordon, S.D.1
Katz, J.2
Kolesnikov, V.3
Krell, F.4
Malkin, T.5
Raykova, M.6
Vahlis, Y.7
-
18
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012.
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
19
-
-
84914153789
-
Automating efficient ram-model secure computation
-
C. Liu, Y. Huang, E. Shi, J. Katz, and M. Hicks. Automating efficient ram-model secure computation. IEEE S & P, 2014.
-
(2014)
IEEE S & P
-
-
Liu, C.1
Huang, Y.2
Shi, E.3
Katz, J.4
Hicks, M.5
-
20
-
-
84873955790
-
Distributed oblivious ram for secure two-party computation
-
Berlin, Heidelberg, Springer-Verlag
-
S. Lu and R. Ostrovsky. Distributed oblivious ram for secure two-party computation. In Proceedings of the 10th Theory of Cryptography Conference on Theory of Cryptography, TCC'13, pages 377-396, Berlin, Heidelberg, 2013. Springer-Verlag.
-
(2013)
Proceedings of the 10th Theory of Cryptography Conference on Theory of Cryptography, TCC'13
, pp. 377-396
-
-
Lu, S.1
Ostrovsky, R.2
-
21
-
-
84889002819
-
Phantom: Practical oblivious computation in a secure processor
-
M. Maas, E. Love, E. Stefanov, M. Tiwari, E. Shi, K. Asanovic, J. Kubiatowicz, and D. Song. Phantom: Practical oblivious computation in a secure processor. In CCS, 2013.
-
(2013)
CCS
-
-
Maas, M.1
Love, E.2
Stefanov, E.3
Tiwari, M.4
Shi, E.5
Asanovic, K.6
Kubiatowicz, J.7
Song, D.8
-
24
-
-
84907811852
-
Data-oblivious data structures
-
J. C. Mitchell and J. Zimmerman. Data-Oblivious Data Structures. In STACS 2014, pages 554-565, 2014.
-
(2014)
STACS 2014
, pp. 554-565
-
-
Mitchell, J.C.1
Zimmerman, J.2
-
25
-
-
84888987660
-
Privacy-preserving matrix factorization
-
V. Nikolaenko, S. Ioannidis, U. Weinsberg, M. Joye, N. Taft, and D. Boneh. Privacy-preserving matrix factorization. In CCS, pages 801-812, 2013.
-
(2013)
CCS
, pp. 801-812
-
-
Nikolaenko, V.1
Ioannidis, S.2
Weinsberg, U.3
Joye, M.4
Taft, N.5
Boneh, D.6
-
26
-
-
82955198779
-
Efficient computation on oblivious RAMs
-
R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, 1990.
-
(1990)
STOC
-
-
Ostrovsky, R.1
-
27
-
-
84899079157
-
Private information storage (extended abstract
-
R. Ostrovsky and V. Shoup. Private information storage (extended abstract). In STOC, 1997.
-
(1997)
STOC
-
-
Ostrovsky, R.1
Shoup, V.2
-
29
-
-
84914124819
-
Wysteria: A programming language for generic mixed-mode multiparty computations
-
A. Rastogi, M. A. Hammer, and M. Hicks. Wysteria: A programming language for generic, mixed-mode multiparty computations. IEEE S & P, 2014.
-
(2014)
IEEE S & P
-
-
Rastogi, A.1
Hammer, M.A.2
Hicks, M.3
-
31
-
-
84865468854
-
Fastprp: Fast pseudo-random permutations for small domains
-
E. Stefanov and E. Shi. Fastprp: Fast pseudo-random permutations for small domains. Cryptology ePrint Archive, 2012. http://eprint.iacr.org/.
-
(2012)
Cryptology EPrint Archive
-
-
Stefanov, E.1
Shi, E.2
-
32
-
-
84889071325
-
Multi-cloud oblivious storage
-
E. Stefanov and E. Shi. Multi-cloud oblivious storage. In CCS, 2013.
-
(2013)
CCS
-
-
Stefanov, E.1
Shi, E.2
-
34
-
-
84889005645
-
Path ORAM: An extremely simple oblivious ram protocol
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: an extremely simple oblivious ram protocol. In In CCS, 2013.
-
(2013)
CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
35
-
-
84910673132
-
Circuit ORAM and on tightness of the goldreich-ostrovsky lower bound
-
X. S. Wang, T.-H. H. Chan, and E. Shi. Circuit ORAM and on tightness of the goldreich-ostrovsky lower bound. Manuscript, 2014.
-
(2014)
Manuscript
-
-
Wang, X.S.1
Chan, T.-H.H.2
Shi, E.3
-
36
-
-
84910678637
-
Oblivious data structures
-
X. S. Wang, K. Nayak, C. Liu, T.-H. H. Chan, E. Shi, E. Stefanov, and Y. Huang. Oblivious data structures. In CCS, 2014.
-
(2014)
CCS
-
-
Wang, X.S.1
Nayak, K.2
Liu, C.3
Chan, T.-H.H.4
Shi, E.5
Stefanov, E.6
Huang, Y.7
-
38
-
-
84881256639
-
Round-optimal access privacy on outsourced storage
-
P. Williams and R. Sion. Round-optimal access privacy on outsourced storage. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
39
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In CCS, 2008.
-
(2008)
CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
40
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
|