메뉴 건너뛰기




Volumn , Issue , 2014, Pages 623-638

Automating efficient RAM-model secure computation

Author keywords

[No Author keywords available]

Indexed keywords

CIRCUIT SIMULATION;

EID: 84914153789     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.46     Document Type: Conference Paper
Times cited : (82)

References (32)
  • 1
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • J. Agat. Transforming out timing leaks. In POPL, 2000.
    • (2000) POPL
    • Agat, J.1
  • 2
    • 84976663189 scopus 로고
    • Detecting equality of variables in programs
    • B. Alpern, M. N. Wegman, and F. K. Zadeck. Detecting equality of variables in programs. In In POPL, 1988.
    • (1988) POPL
    • Alpern, B.1    Wegman, M.N.2    Zadeck, F.K.3
  • 3
    • 70350540998 scopus 로고    scopus 로고
    • Termination in sensitive noninterference leaks more than just a bit
    • A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands. Termination in sensitive noninterference leaks more than just a bit. In ESORICS, 2008.
    • (2008) ESORICS
    • Askarov, A.1    Hunt, S.2    Sabelfeld, A.3    Sands, D.4
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 2000.
    • (2000) Journal of Cryptology
    • Canetti, R.1
  • 6
    • 85042713075 scopus 로고    scopus 로고
    • Secure outsourced garbled circuit evaluation for mobile devices
    • H. Carter, B. Mood, P. Traynor, and K. Butler. Secure outsourced garbled circuit evaluation for mobile devices. In USENIX Security, 2013.
    • (2013) USENIX Security
    • Carter, H.1    Mood, B.2    Traynor, P.3    Butler, K.4
  • 8
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • May
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, May 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 9
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011.
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 13
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure twoparty computation using garbled circuits
    • Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure twoparty computation using garbled circuits. In USENIX Security, 2011.
    • (2011) USENIX Security
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 15
    • 80755169442 scopus 로고    scopus 로고
    • Automatically optimizing secure computation
    • F. Kerschbaum. Automatically optimizing secure computation. In CCS, 2011.
    • (2011) CCS
    • Kerschbaum, F.1
  • 16
    • 84893284162 scopus 로고    scopus 로고
    • PCF: A portable circuit format for scalable two-party secure computation
    • B. Kreuter, B. Mood, A. Shelat, and K. Butler. PCF: A portable circuit format for scalable two-party secure computation. In USENIX Security, 2013.
    • (2013) USENIX Security
    • Kreuter, B.1    Mood, B.2    Shelat, A.3    Butler, K.4
  • 17
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012.
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 18
    • 84885008414 scopus 로고    scopus 로고
    • Memory trace oblivious program execution
    • C. Liu, M. Hicks, and E. Shi. Memory trace oblivious program execution. In CSF, 2013.
    • (2013) CSF
    • Liu, C.1    Hicks, M.2    Shi, E.3
  • 19
    • 84914109941 scopus 로고    scopus 로고
    • Automating efficient RAM-model secure computation
    • University of Maryland, Department of Computer Science, Mar.
    • C. Liu, Y. Huang, E. Shi, J. Katz, and M. Hicks. Automating efficient RAM-model secure computation. Technical Report CS-TR-5033, University of Maryland, Department of Computer Science, Mar. 2014.
    • (2014) Technical Report
    • Liu, C.1    Huang, Y.2    Shi, E.3    Katz, J.4    Hicks, M.5
  • 20
    • 84910654722 scopus 로고    scopus 로고
    • How to garble RAM programs
    • S. Lu and R. Ostrovsky. How to garble RAM programs. In EUROCRYPT, 2013.
    • (2013) EUROCRYPT
    • Lu, S.1    Ostrovsky, R.2
  • 22
    • 84865295525 scopus 로고    scopus 로고
    • Knowledgeoriented secure multiparty computation
    • P. Mardziel, M. Hicks, J. Katz, and M. Srivatsa. Knowledgeoriented secure multiparty computation. In PLAS, 2012.
    • (2012) PLAS
    • Mardziel, P.1    Hicks, M.2    Katz, J.3    Srivatsa, M.4
  • 23
    • 70449690543 scopus 로고    scopus 로고
    • The program counter security model: Automatic detection and removal of control-flow side channel attacks
    • D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In ICISC, 2005.
    • (2005) ICISC
    • Molnar, D.1    Piotrowski, M.2    Schultz, D.3    Wagner, D.4
  • 24
    • 84914124819 scopus 로고    scopus 로고
    • Wysteria: A programming language for generic, mixed-mode multiparty computations
    • A. Rastogi, M. A. Hammer, and M. Hicks. Wysteria: A programming language for generic, mixed-mode multiparty computations. In IEEE S & P, 2014.
    • (2014) IEEE S & P
    • Rastogi, A.1    Hammer, M.A.2    Hicks, M.3
  • 25
    • 84890726242 scopus 로고    scopus 로고
    • Knowledge inference for optimizing secure multi-party computation
    • A. Rastogi, P. Mardziel, M. Hammer, and M. Hicks. Knowledge inference for optimizing secure multi-party computation. In PLAS, 2013.
    • (2013) PLAS
    • Rastogi, A.1    Mardziel, P.2    Hammer, M.3    Hicks, M.4
  • 29
    • 0000648555 scopus 로고
    • A permutation network
    • A. Waksman. A permutation network. J. ACM, 15, 1968.
    • (1968) J. ACM , vol.15
    • Waksman, A.1
  • 30
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In CCS, 2008.
    • (2008) CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 31
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1
  • 32
    • 84881219897 scopus 로고    scopus 로고
    • Circuit structures for improving efficiency of security and privacy tools
    • S. Zahur and D. Evans. Circuit structures for improving efficiency of security and privacy tools. In S & P, 2013.
    • (2013) S & P
    • Zahur, S.1    Evans, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.