메뉴 건너뛰기




Volumn , Issue , 2014, Pages 215-226

Oblivious data structures

Author keywords

Cryptography; Oblivious algorithms; Security

Indexed keywords

CRYPTOGRAPHY; DATA STRUCTURES; FLOW GRAPHS;

EID: 84910678637     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660314     Document Type: Conference Paper
Times cited : (142)

References (56)
  • 2
    • 78650017523 scopus 로고    scopus 로고
    • Predictive black-box mitigation of timing channels
    • Askarov, A., Zhang, D., and Myers, A. C. Predictive black-box mitigation of timing channels. In CCS (2010), pp. 297-307.
    • (2010) CCS , pp. 297-307
    • Askarov, A.1    Zhang, D.2    Myers, A.C.3
  • 3
    • 0001071323 scopus 로고
    • Plongements lipschitziens dans Rn
    • Assouad, P. Plongements lipschitziens dans Rn. Bull. Soc. Math. France 111, 4 (1983), 429-448.
    • (1983) Bull. Soc. Math. France , vol.111 , Issue.4 , pp. 429-448
    • Assouad, P.1
  • 4
    • 56349136928 scopus 로고    scopus 로고
    • Random sampling from a search engine's index
    • Bar-Yossef, Z., and Gurevich, M. Random sampling from a search engine's index. J. ACM (2008).
    • (2008) J. ACM
    • Bar-Yossef, Z.1    Gurevich, M.2
  • 7
    • 84877998963 scopus 로고    scopus 로고
    • Data-oblivious graph algorithms for secure computation and outsourcing
    • Blanton, M., Steele, A., and Aliasgari, M. Data-oblivious graph algorithms for secure computation and outsourcing. In ASIACCS (2013).
    • (2013) ASIACCS
    • Blanton, M.1    Steele, A.2    Aliasgari, M.3
  • 8
    • 46749157919 scopus 로고    scopus 로고
    • Strongly history-independent hashing with applications
    • Blelloch, G. E., and Golovin, D. Strongly history-independent hashing with applications. In FOCS (2007).
    • (2007) FOCS
    • Blelloch, G.E.1    Golovin, D.2
  • 10
    • 0033453107 scopus 로고    scopus 로고
    • Nearest neighbor queries in metric spaces
    • Clarkson, K. L. Nearest neighbor queries in metric spaces. Discrete Comput. Geom. 22, 1 (1999), 63-93.
    • (1999) Discrete Comput. Geom , vol.22 , Issue.1 , pp. 63-93
    • Clarkson, K.L.1
  • 11
    • 82955204091 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • Damgård, I., Meldgaard, S., and Nielsen, J. B. Perfectly secure oblivious RAM without random oracles. In TCC (2011).
    • (2011) TCC
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 12
    • 78650606457 scopus 로고    scopus 로고
    • Privacy-preserving data-oblivious geometric algorithms for geographic data
    • Eppstein, D., Goodrich, M. T., and Tamassia, R. Privacy-preserving data-oblivious geometric algorithms for geographic data. In GIS (2010).
    • (2010) GIS
    • Eppstein, D.1    Goodrich, M.T.2    Tamassia, R.3
  • 13
    • 84881225045 scopus 로고    scopus 로고
    • A secure processor architecture for encrypted computation on untrusted programs
    • Fletcher, C. W., Dijk, M. v., and Devadas, S. A secure processor architecture for encrypted computation on untrusted programs. In STC (2012).
    • (2012) STC
    • Fletcher, C.W.1    Dijk, M.V.2    Devadas, S.3
  • 16
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • Goldreich, O. Towards a theory of software protection and simulation by oblivious RAMs. In STOC (1987).
    • (1987) STOC
    • Goldreich, O.1
  • 17
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich, O., and Ostrovsky, R. Software protection and simulation on oblivious RAMs. J. ACM (1996).
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 18
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • Goodrich, M. T., and Mitzenmacher, M. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP (2011).
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 19
    • 80955131283 scopus 로고    scopus 로고
    • Oblivious RAM simulation with efficient worst-case access overhead
    • Goodrich, M. T., Mitzenmacher, M., Ohrimenko, O., and Tamassia, R. Oblivious RAM simulation with efficient worst-case access overhead. In CCSW (2011).
    • (2011) CCSW
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 21
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • Goodrich, M. T., Mitzenmacher, M., Ohrimenko, O., and Tamassia, R. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA (2012).
    • (2012) SODA
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 22
    • 84874155278 scopus 로고    scopus 로고
    • Data-oblivious graph drawing model and algorithms
    • abs/1209.0756
    • Goodrich, M. T., Ohrimenko, O., and Tamassia, R. Data-oblivious graph drawing model and algorithms. CoRR abs/1209.0756 (2012).
    • (2012) CoRR
    • Goodrich, M.T.1    Ohrimenko, O.2    Tamassia, R.3
  • 24
    • 0344550482 scopus 로고    scopus 로고
    • Bounded geometries, fractals, and low-distortion embeddings
    • Gupta, A., Krauthgamer, R., and Lee, J. R. Bounded geometries, fractals, and low-distortion embeddings. In FOCS (2003), pp. 534-543.
    • (2003) FOCS , pp. 534-543
    • Gupta, A.1    Krauthgamer, R.2    Lee, J.R.3
  • 26
    • 85179556059 scopus 로고    scopus 로고
    • Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
    • Islam, M., Kuzu, M., and Kantarcioglu, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS (2012).
    • (2012) NDSS
    • Islam, M.1    Kuzu, M.2    Kantarcioglu, M.3
  • 28
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • Kushilevitz, E., Lu, S., and Ostrovsky, R. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA (2012).
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 30
    • 84885008414 scopus 로고    scopus 로고
    • Memory trace oblivious program execution
    • Liu, C., Hicks, M., and Shi, E. Memory trace oblivious program execution. In CSF (2013).
    • (2013) CSF
    • Liu, C.1    Hicks, M.2    Shi, E.3
  • 31
    • 84914153789 scopus 로고    scopus 로고
    • Automating efficient RAM-model secure computation
    • May
    • Liu, C., Huang, Y., Shi, E., Katz, J., and Hicks, M. Automating efficient RAM-model secure computation. In IEEE S & P (May 2014).
    • (2014) IEEE S & P
    • Liu, C.1    Huang, Y.2    Shi, E.3    Katz, J.4    Hicks, M.5
  • 32
    • 84910593773 scopus 로고    scopus 로고
    • Distributed oblivious RAM for secure two-party computation
    • Lu, S., and Ostrovsky, R. Distributed oblivious RAM for secure two-party computation. In TCC (2013).
    • (2013) TCC
    • Lu, S.1    Ostrovsky, R.2
  • 33
    • 84910654722 scopus 로고    scopus 로고
    • How to garble ram programs
    • Lu, S., and Ostrovsky, R. How to garble ram programs. In EUROCRYPT (2013).
    • (2013) EUROCRYPT
    • Lu, S.1    Ostrovsky, R.2
  • 35
    • 0030676111 scopus 로고    scopus 로고
    • Oblivious data structures: Applications to cryptography
    • ACM
    • Micciancio, D. Oblivious data structures: applications to cryptography. In STOC (1997), ACM.
    • (1997) STOC
    • Micciancio, D.1
  • 36
    • 84945230281 scopus 로고    scopus 로고
    • Data-oblivious data structures
    • Mitchell, J. C., and Zimmerman, J. Data-Oblivious Data Structures. In STACS (2014).
    • (2014) STACS
    • Mitchell, J.C.1    Zimmerman, J.2
  • 38
    • 84899079157 scopus 로고    scopus 로고
    • Private information storage (extended abstract
    • Ostrovsky, R., and Shoup, V. Private information storage (extended abstract). In STOC (1997).
    • (1997) STOC
    • Ostrovsky, R.1    Shoup, V.2
  • 39
    • 0018456413 scopus 로고
    • Relations among complexity measures
    • Pippenger, N., and Fischer, M. J. Relations among complexity measures. In J. ACM (1979).
    • (1979) J. ACM
    • Pippenger, N.1    Fischer, M.J.2
  • 43
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • Stefanov, E., Shi, E., and Song, D. Towards practical oblivious RAM. In NDSS (2012).
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 45
    • 1142280988 scopus 로고    scopus 로고
    • Aegis: Architecture for tamper-evident and tamper-resistant processing
    • Suh, G. E., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S. Aegis: architecture for tamper-evident and tamper-resistant processing. In ICS (2003).
    • (2003) ICS
    • Suh, G.E.1    Clarke, D.2    Gassend, B.3    Van Dijk, M.4    Devadas, S.5
  • 47
    • 79959864414 scopus 로고    scopus 로고
    • Secure data structures based on multi-party computation
    • Toft, T. Secure data structures based on multi-party computation. In PODC (2011), pp. 291-292.
    • (2011) PODC , pp. 291-292
    • Toft, T.1
  • 50
    • 84881256639 scopus 로고    scopus 로고
    • Round-optimal access privacy on outsourced storage
    • Williams, P., and Sion, R. Round-optimal access privacy on outsourced storage. In CCS (2012).
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 51
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Williams, P., Sion, R., and Carbunar, B. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In CCS (2008).
    • (2008) CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 52
    • 84869453208 scopus 로고    scopus 로고
    • Privatefs: A parallel oblivious file system
    • Williams, P., Sion, R., and Tomescu, A. Privatefs: A parallel oblivious file system. In CCS (2012).
    • (2012) CCS
    • Williams, P.1    Sion, R.2    Tomescu, A.3
  • 53
    • 84881219897 scopus 로고    scopus 로고
    • Circuit structures for improving efficiency of security and privacy tools
    • Zahur, S., and Evans, D. Circuit structures for improving efficiency of security and privacy tools. In S & P (2013).
    • (2013) S & P
    • Zahur, S.1    Evans, D.2
  • 54
    • 80755187785 scopus 로고    scopus 로고
    • Predictive mitigation of timing channels in interactive systems
    • Zhang, D., Askarov, A., and Myers, A. C. Predictive mitigation of timing channels in interactive systems. In CCS (2011), pp. 563-574.
    • (2011) CCS , pp. 563-574
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 55
    • 84866417462 scopus 로고    scopus 로고
    • Language-based control and mitigation of timing channels
    • Zhang, D., Askarov, A., and Myers, A. C. Language-based control and mitigation of timing channels. In PLDI (2012), pp. 99-110.
    • (2012) PLDI , pp. 99-110
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 56
    • 12844260675 scopus 로고    scopus 로고
    • Hide: An infrastructure for efficiently protecting information leakage on the address bus
    • Oct
    • Zhuang, X., Zhang, T., and Pande, S. Hide: an infrastructure for efficiently protecting information leakage on the address bus. SIGARCH Comput. Archit. News 32, 5 (Oct. 2004), 72-84.
    • (2004) SIGARCH Comput. Archit. News , vol.32 , Issue.5 , pp. 72-84
    • Zhuang, X.1    Zhang, T.2    Pande, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.