메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 359-376

ObliVM: A programming framework for secure computation

Author keywords

Compiler; Oblivious Algorithms; Oblivious RAM; Programming Language; Secure Computation; Type System

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; CRYPTOGRAPHY; GRAPH ALGORITHMS; PROBLEM ORIENTED LANGUAGES; PROGRAM COMPILERS;

EID: 84945182982     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.29     Document Type: Conference Paper
Times cited : (265)

References (60)
  • 1
    • 79961186203 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in FOCS, 1982.
    • (1982) FOCS
    • Yao, A.C.-C.1
  • 5
    • 78149254461 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • V. Kolesnikov and T. Schneider, "Improved Garbled Circuit: Free XOR Gates and Applications," in ICALP, 2008.
    • (2008) ICALP
    • Kolesnikov, V.1    Schneider, T.2
  • 7
    • 84945186416 scopus 로고    scopus 로고
    • Garbling XOR gates "for free" in the standard model
    • B. Applebaum, "Garbling xor gates "for free" in the standard model," in TCC, 2013.
    • (2013) TCC
    • Applebaum, B.1
  • 8
    • 84889059259 scopus 로고    scopus 로고
    • More efficient oblivious transfer and extensions for faster secure computation
    • G. Asharov, Y. Lindell, T. Schneider, and M. Zohner, "More Efficient Oblivious Transfer and Extensions for Faster Secure Computation," ser. CCS '13, 2013.
    • (2013) Ser. CCS '13
    • Asharov, G.1    Lindell, Y.2    Schneider, T.3    Zohner, M.4
  • 9
    • 80052383468 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacy-preserving computations
    • D. Bogdanov, S. Laur, and J. Willemson, "Sharemind: A Framework for Fast Privacy-Preserving Computations," in ESORICS, 2008.
    • (2008) ESORICS
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 10
    • 84893284162 scopus 로고    scopus 로고
    • PCF: A portable circuit format for scalable two-party secure computation
    • B. Kreuter, B. Mood, A. Shelat, and K. Butler, "PCF: A portable circuit format for scalable two-party secure computation," in Usenix Security, 2013.
    • (2013) Usenix Security
    • Kreuter, B.1    Mood, B.2    Shelat, A.3    Butler, K.4
  • 11
    • 84889076745 scopus 로고    scopus 로고
    • Billion-gate secure computation with malicious adversaries
    • B. Kreuter, a. shelat, and C.-H. Shen, "Billion-gate secure computation with malicious adversaries," in USENIX Security, 2012.
    • (2012) USENIX Security
    • Kreuter, B.1    Shelat, A.2    Shen, C.-H.3
  • 14
    • 84889039708 scopus 로고    scopus 로고
    • PICCO: A general-purpose compiler for private distributed computation
    • Y. Zhang, A. Steele, and M. Blanton, "PICCO: a general-purpose compiler for private distributed computation," in CCS, 2013.
    • (2013) CCS
    • Zhang, Y.1    Steele, A.2    Blanton, M.3
  • 15
    • 84914153789 scopus 로고    scopus 로고
    • Automating efficient RAM-model secure computation
    • May
    • C. Liu, Y. Huang, E. Shi, J. Katz, and M. Hicks, "Automating Efficient RAM-model Secure Computation," in S & P, May 2014.
    • (2014) S & P
    • Liu, C.1    Huang, Y.2    Shi, E.3    Katz, J.4    Hicks, M.5
  • 17
    • 84914124819 scopus 로고    scopus 로고
    • Wysteria: A programming language for generic, mixed-mode multiparty computations
    • A. Rastogi, M. A. Hammer, and M. Hicks, "Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations," in S & P, 2014.
    • (2014) S & P
    • Rastogi, A.1    Hammer, M.A.2    Hicks, M.3
  • 18
    • 84945241350 scopus 로고    scopus 로고
    • Partisia
    • "Partisia," http://www.partisia.dk/.
  • 19
    • 84945241351 scopus 로고    scopus 로고
    • Dyadic security
    • "Dyadic security," http://www.dyadicsec.com/.
  • 20
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti, "Security and composition of multiparty cryptographic protocols," Journal of Cryptology, 2000.
    • (2000) Journal of Cryptology
    • Canetti, R.1
  • 22
    • 84945241353 scopus 로고    scopus 로고
    • Data-oblivious graph algorithms in outsourced external memory
    • vol. abs/1409.0597
    • M. T. Goodrich and J. A. Simons, "Data-Oblivious Graph Algorithms in Outsourced External Memory," CoRR, vol. abs/1409.0597, 2014.
    • (2014) CoRR
    • Goodrich, M.T.1    Simons, J.A.2
  • 23
    • 79960860547 scopus 로고    scopus 로고
    • Privacy-preserving graph algorithms in the semi-honest model
    • J. Brickell and V. Shmatikov, "Privacy-preserving graph algorithms in the semi-honest model," in ASIACRYPT, 2005.
    • (2005) ASIACRYPT
    • Brickell, J.1    Shmatikov, V.2
  • 27
    • 84910645702 scopus 로고    scopus 로고
    • Efficient, oblivious data structures for MPC
    • M. Keller and P. Scholl, "Efficient, oblivious data structures for MPC," in Asiacrypt, 2014.
    • (2014) Asiacrypt
    • Keller, M.1    Scholl, P.2
  • 28
    • 84907811852 scopus 로고    scopus 로고
    • Data-oblivious data structures
    • J. C. Mitchell and J. Zimmerman, "Data-Oblivious Data Structures," in STACS, 2014, pp. 554-565.
    • (2014) STACS , pp. 554-565
    • Mitchell, J.C.1    Zimmerman, J.2
  • 30
    • 84945241358 scopus 로고    scopus 로고
    • Rsa distributed credential protection
    • "Rsa distributed credential protection," http://www.emc.com/security/rsa-distributed-credential-protection.htm.
  • 31
    • 84885008414 scopus 로고    scopus 로고
    • Memory trace oblivious program execution
    • C. Liu, M. Hicks, and E. Shi, "Memory trace oblivious program execution," ser. CSF '13, 2013, pp. 51-65.
    • (2013) Ser. CSF '13 , pp. 51-65
    • Liu, C.1    Hicks, M.2    Shi, E.3
  • 35
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao, "How to generate and exchange secrets," in FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1
  • 36
    • 0003061777 scopus 로고    scopus 로고
    • Privacy preserving auctions and mechanism design
    • M. Naor, B. Pinkas, and R. Sumner, "Privacy preserving auctions and mechanism design," ser. EC '99, 1999.
    • (1999) Ser. EC '99
    • Naor, M.1    Pinkas, B.2    Sumner, R.3
  • 37
    • 84945241362 scopus 로고    scopus 로고
    • Two halves make a whole: Reducing data transfer in garbled circuits using half gates
    • S. Zahur, M. Rosulek, and D. Evans, "Two halves make a whole: Reducing data transfer in garbled circuits using half gates," in EUROCRYPT, 2015.
    • (2015) EUROCRYPT
    • Zahur, S.1    Rosulek, M.2    Evans, D.3
  • 38
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in STOC, 2009.
    • (2009) STOC
    • Gentry, C.1
  • 40
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 41
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich, "Towards a theory of software protection and simulation by oblivious RAMs," in STOC, 1987.
    • (1987) STOC
    • Goldreich, O.1
  • 43
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • J. Agat, "Transforming out timing leaks," in POPL, 2000.
    • (2000) POPL
    • Agat, J.1
  • 45
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • M. T. Goodrich and M. Mitzenmacher, "Privacy-preserving access of outsourced data via oblivious RAM simulation," in ICALP, 2011.
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 48
    • 84945241365 scopus 로고    scopus 로고
    • Graphlab
    • "Graphlab," http://graphlab.org.
  • 49
    • 84877998963 scopus 로고    scopus 로고
    • Data-oblivious graph algorithms for secure computation and outsourcing
    • M. Blanton, A. Steele, and M. Alisagari, "Data-oblivious graph algorithms for secure computation and outsourcing," in ASIA CCS, 2013.
    • (2013) Asia CCS
    • Blanton, M.1    Steele, A.2    Alisagari, M.3
  • 55
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • M. Naor and B. Pinkas, "Efficient oblivious transfer protocols," in SODA, 2001.
    • (2001) SODA
    • Naor, M.1    Pinkas, B.2
  • 56
    • 84945241369 scopus 로고    scopus 로고
    • http://humangenomeprivacy.org/2015.
  • 60
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky, "On the (in)security of hash-based oblivious RAM and a new balancing scheme," in SODA, 2012.
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.