메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 377-394

GraphSC: Parallel secure computation made easy

Author keywords

graph algorithms; oblivious algorithms; parallel algorithms; secure computation

Indexed keywords

CRYPTOGRAPHY; DATA MINING; FACTORIZATION; GRAPH ALGORITHMS; GRAPHIC METHODS; LARGE DATASET; MACHINE LEARNING; PARALLEL ALGORITHMS; PARALLEL PROGRAMMING;

EID: 84945191638     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.30     Document Type: Conference Paper
Times cited : (107)

References (78)
  • 1
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao, "How to generate and exchange secrets," in FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1
  • 7
    • 37549003336 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat, "Mapreduce: Simplified data processing on large clusters," Commun. ACM, 2008.
    • (2008) Commun. ACM
    • Dean, J.1    Ghemawat, S.2
  • 12
    • 85072980230 scopus 로고    scopus 로고
    • Powergraph: Distributed graph-parallel computation on natural graphs
    • J. E. Gonzalez, Y. Low, H. Gu, D. Bickson, and C. Guestrin, "Powergraph: Distributed graph-parallel computation on natural graphs." in OSDI, 2012.
    • (2012) OSDI
    • Gonzalez, J.E.1    Low, Y.2    Gu, H.3    Bickson, D.4    Guestrin, C.5
  • 14
    • 84874155278 scopus 로고    scopus 로고
    • Data-oblivious graph drawing model and algorithms
    • M. T. Goodrich, O. Ohrimenko, and R. Tamassia, "Data-oblivious graph drawing model and algorithms," CoRR, 2012.
    • (2012) CoRR
    • Goodrich, M.T.1    Ohrimenko, O.2    Tamassia, R.3
  • 15
    • 78650606457 scopus 로고    scopus 로고
    • Privacy-preserving data-oblivious geometric algorithms for geographic data
    • D. Eppstein, M. T. Goodrich, and R. Tamassia, "Privacy-preserving data-oblivious geometric algorithms for geographic data," in SIGSPA-TIAL, 2010.
    • (2010) SIGSPA-TIAL
    • Eppstein, D.1    Goodrich, M.T.2    Tamassia, R.3
  • 16
    • 84881219897 scopus 로고    scopus 로고
    • Circuit structures for improving efficiency of security and privacy tools
    • S. Zahur and D. Evans, "Circuit structures for improving efficiency of security and privacy tools," in S & P, 2013.
    • (2013) S & P
    • Zahur, S.1    Evans, D.2
  • 17
    • 84877998963 scopus 로고    scopus 로고
    • Data-oblivious graph algorithms for secure computation and outsourcing
    • M. Blanton, A. Steele, and M. Alisagari, "Data-oblivious graph algorithms for secure computation and outsourcing," in ASIA CCS. ACM, 2013.
    • (2013) Asia CCS ACM
    • Blanton, M.1    Steele, A.2    Alisagari, M.3
  • 18
    • 79961186203 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in FOCS, 1982.
    • (1982) FOCS
    • Yao, A.C.-C.1
  • 20
    • 84889073782 scopus 로고    scopus 로고
    • Fast two-party secure computation with minimal assumptions
    • a. shelat and C.-H. Shen
    • a. shelat and C.-H. Shen, "Fast two-party secure computation with minimal assumptions," in CCS, 2013.
    • (2013) CCS
  • 22
    • 80755169442 scopus 로고    scopus 로고
    • Automatically optimizing secure computation
    • F. Kerschbaum, "Automatically optimizing secure computation," in CCS, 2011.
    • (2011) CCS
    • Kerschbaum, F.1
  • 24
    • 84893284162 scopus 로고    scopus 로고
    • PCF: A portable circuit format for scalable two-party secure computation
    • B. Kreuter, B. Mood, A. Shelat, and K. Butler, "PCF: A portable circuit format for scalable two-party secure computation," in USENIX Security, 2013.
    • (2013) USENIX Security
    • Kreuter, B.1    Mood, B.2    Shelat, A.3    Butler, K.4
  • 29
    • 84889039708 scopus 로고    scopus 로고
    • Picco: A general-purpose compiler for private distributed computation
    • Y. Zhang, A. Steele, and M. Blanton, "Picco: a general-purpose compiler for private distributed computation," in CCS, 2013.
    • (2013) CCS
    • Zhang, Y.1    Steele, A.2    Blanton, M.3
  • 30
    • 78149254461 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • V. Kolesnikov and T. Schneider, "Improved Garbled Circuit: Free XOR Gates and Applications," in ICALP, 2008.
    • (2008) ICALP
    • Kolesnikov, V.1    Schneider, T.2
  • 37
    • 0002531104 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in ACM STOC, 1988.
    • (1988) ACM STOC
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 38
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 39
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Privacy-preserving group data access via stateless oblivious RAM simulation," in SODA, 2012.
    • (2012) SODA
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 41
    • 84860181777 scopus 로고    scopus 로고
    • On the (in)security of hash-based oblivious RAM and a new balancing scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky, "On the (in)security of hash-based oblivious RAM and a new balancing scheme," in SODA, 2012.
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 42
    • 80955131283 scopus 로고    scopus 로고
    • Oblivious RAM simulation with efficient worst-case access overhead
    • M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Oblivious RAM simulation with efficient worst-case access overhead," in CCSW, 2011.
    • (2011) CCSW
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 43
    • 82955204091 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • I. Damgård, S. Meldgaard, and J. B. Nielsen, "Perfectly secure oblivious RAM without random oracles," in TCC, 2011.
    • (2011) TCC
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 45
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in CCS, 2008.
    • (2008) CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 47
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • M. T. Goodrich and M. Mitzenmacher, "Privacy-preserving access of outsourced data via oblivious RAM simulation," in ICALP, 2011.
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 49
    • 84881231420 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • B. Pinkas and T. Reinman, "Oblivious RAM revisited," in CRYPTO, 2010.
    • (2010) CRYPTO
    • Pinkas, B.1    Reinman, T.2
  • 50
    • 84945230278 scopus 로고    scopus 로고
    • SR-ORAM: Single round-trip oblivious ram
    • P. Williams and R. Sion, "SR-ORAM: Single round-trip oblivious ram," in ACM CCS, 2012.
    • (2012) ACM CCS
    • Williams, P.1    Sion, R.2
  • 59
    • 81055146170 scopus 로고    scopus 로고
    • Giraph: Large-scale graph processing infrastruction on hadoop
    • C. Avery, "Giraph: Large-scale graph processing infrastruction on hadoop," Hadoop Summit., 2011.
    • (2011) Hadoop Summit.
    • Avery, C.1
  • 60
    • 0038589165 scopus 로고    scopus 로고
    • The anatomy of a large-scale hypertextual web search engine
    • S. Brin and L. Page, "The anatomy of a large-scale hypertextual web search engine," Computer networks and ISDN systems, 1998.
    • (1998) Computer Networks and ISDN Systems
    • Brin, S.1    Page, L.2
  • 61
    • 85008044987 scopus 로고    scopus 로고
    • Matrix factorization techniques for recommender systems
    • Y Koren, R. Bell, and C. Volinsky, "Matrix factorization techniques for recommender systems," Computer, vol. 42, no. 8, pp. 30-37, 2009.
    • (2009) Computer , vol.42 , Issue.8 , pp. 30-37
    • Koren, Y.1    Bell, R.2    Volinsky, C.3
  • 67
    • 84945230284 scopus 로고    scopus 로고
    • Algorithms sequential & parallel: A unified approach
    • R. Miller and L. Boxer, Algorithms sequential & parallel: A unified approach. Cengage Learning, 2012.
    • (2012) Cengage Learning
    • Miller, R.1    Boxer, L.2
  • 68
    • 67650136792 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Y Lindell and B. Pinkas, "An efficient protocol for secure two-party computation in the presence of malicious adversaries," in EUROCRYPT, 2007.
    • (2007) EUROCRYPT
    • Lindell, Y.1    Pinkas, B.2
  • 70
    • 84945230285 scopus 로고    scopus 로고
    • "Oblivm," http://www.oblivm.com.
    • Oblivm
  • 71
    • 84904200574 scopus 로고    scopus 로고
    • Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in o(n log n) time
    • M. T. Goodrich, "Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in o(n log n) time," CoRR, 2014.
    • (2014) CoRR
    • Goodrich, M.T.1
  • 72
    • 84945230286 scopus 로고    scopus 로고
    • Graphlab powergraph tutorials
    • "Graphlab powergraph tutorials," https://github.com/graphlab-code/graphlab.
  • 73
    • 84945230287 scopus 로고    scopus 로고
    • Movielens dataset
    • "Movielens dataset," http://grouplens.org/datasets/movielens/.
  • 74
    • 85116175892 scopus 로고    scopus 로고
    • Recommending with an agenda: Active learning of private attributes using matrix factorization
    • S. Bhagat, U. Weinsberg, S. Ioannidis, and N. Taft, "Recommending with an agenda: Active learning of private attributes using matrix factorization," in RecSys '14. ACM.
    • RecSys '14. ACM
    • Bhagat, S.1    Weinsberg, U.2    Ioannidis, S.3    Taft, N.4
  • 77
    • 84945230291 scopus 로고    scopus 로고
    • Tc man page
    • "Tc man page," http://manpages.ubuntu.com/manpages//karmic/man8/tc.8.html.
  • 78
    • 84945230292 scopus 로고    scopus 로고
    • Iperf
    • "Iperf," https://iperf.fr/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.