메뉴 건너뛰기




Volumn , Issue , 2014, Pages 191-202

SCORAM: Oblivious RAM for secure computation

Author keywords

Oblivious RAM; Secure computation

Indexed keywords

ASYMPTOTIC ANALYSIS; CRYPTOGRAPHY;

EID: 84910613463     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660365     Document Type: Conference Paper
Times cited : (126)

References (40)
  • 3
    • 84889037522 scopus 로고    scopus 로고
    • arXiv preprint arXiv:1307.3699
    • K.-M. Chung, Z. Liu, and R. Pass. Statistically-secure oram with O(log2 n) overhead. arXiv preprint arXiv:1307.3699, 2013.
    • (2013) 2 N) Overhead
    • Chung, K.-M.1    Liu, Z.2    Pass, R.3
  • 4
    • 82955204091 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, 2011.
    • (2011) TCC
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 5
    • 84881225045 scopus 로고    scopus 로고
    • A secure processor architecture for encrypted computation on untrusted programs
    • C. W. Fletcher, M. v. Dijk, and S. Devadas. A secure processor architecture for encrypted computation on untrusted programs. In STC, 2012.
    • (2012) STC
    • Fletcher, C.W.1    Dijk M, V.2    Devadas, S.3
  • 7
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
    • (1987) STOC
    • Goldreich, O.1
  • 9
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011.
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 10
  • 11
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA, 2012.
    • (2012) SODA
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 18
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012.
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 24
    • 84907811852 scopus 로고    scopus 로고
    • Data-oblivious data structures
    • J. C. Mitchell and J. Zimmerman. Data-Oblivious Data Structures. In STACS 2014, pages 554-565, 2014.
    • (2014) STACS 2014 , pp. 554-565
    • Mitchell, J.C.1    Zimmerman, J.2
  • 26
    • 82955198779 scopus 로고
    • Efficient computation on oblivious RAMs
    • R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, 1990.
    • (1990) STOC
    • Ostrovsky, R.1
  • 27
    • 84899079157 scopus 로고    scopus 로고
    • Private information storage (extended abstract
    • R. Ostrovsky and V. Shoup. Private information storage (extended abstract). In STOC, 1997.
    • (1997) STOC
    • Ostrovsky, R.1    Shoup, V.2
  • 28
    • 84881231420 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • B. Pinkas and T. Reinman. Oblivious RAM revisited. In CRYPTO, 2010.
    • (2010) CRYPTO
    • Pinkas, B.1    Reinman, T.2
  • 29
    • 84914124819 scopus 로고    scopus 로고
    • Wysteria: A programming language for generic mixed-mode multiparty computations
    • A. Rastogi, M. A. Hammer, and M. Hicks. Wysteria: A programming language for generic, mixed-mode multiparty computations. IEEE S & P, 2014.
    • (2014) IEEE S & P
    • Rastogi, A.1    Hammer, M.A.2    Hicks, M.3
  • 31
    • 84865468854 scopus 로고    scopus 로고
    • Fastprp: Fast pseudo-random permutations for small domains
    • E. Stefanov and E. Shi. Fastprp: Fast pseudo-random permutations for small domains. Cryptology ePrint Archive, 2012. http://eprint.iacr.org/.
    • (2012) Cryptology EPrint Archive
    • Stefanov, E.1    Shi, E.2
  • 32
    • 84889071325 scopus 로고    scopus 로고
    • Multi-cloud oblivious storage
    • E. Stefanov and E. Shi. Multi-cloud oblivious storage. In CCS, 2013.
    • (2013) CCS
    • Stefanov, E.1    Shi, E.2
  • 35
    • 84910673132 scopus 로고    scopus 로고
    • Circuit ORAM and on tightness of the goldreich-ostrovsky lower bound
    • X. S. Wang, T.-H. H. Chan, and E. Shi. Circuit ORAM and on tightness of the goldreich-ostrovsky lower bound. Manuscript, 2014.
    • (2014) Manuscript
    • Wang, X.S.1    Chan, T.-H.H.2    Shi, E.3
  • 38
    • 84881256639 scopus 로고    scopus 로고
    • Round-optimal access privacy on outsourced storage
    • P. Williams and R. Sion. Round-optimal access privacy on outsourced storage. In CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 39
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In CCS, 2008.
    • (2008) CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 40
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.