메뉴 건너뛰기




Volumn 8975, Issue , 2015, Pages 147-167

Resizable tree-based oblivious RAM

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DIGITAL STORAGE; RANDOM ACCESS STORAGE; SECURITY OF DATA;

EID: 84949946719     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-47854-7_9     Document Type: Conference Paper
Times cited : (13)

References (20)
  • 1
    • 84949968677 scopus 로고    scopus 로고
    • Amazon: Amazon s3 pricing (2014). http://aws.amazon.com/s3/pricing/
    • (2014)
  • 4
    • 79953223285 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • In: Ishai, Y. (ed.), Springer, Heidelberg
    • Damgård, I., Meldgaard, S., Nielsen, J.B.: Perfectly secure oblivious RAM without random oracles. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 144–163. Springer, Heidelberg (2011)
    • (2011) TCC 2011. LNCS , pp. 144-163
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 6
    • 84884946400 scopus 로고    scopus 로고
    • Optimizing ORAM and using it efficiently for secure computation
    • In: De Cristofaro, E., Wright, M. (eds.), Springer, Heidelberg
    • Gentry, C., Goldman, K.A., Halevi, S., Julta, C., Raykova, M., Wichs, D.: Optimizing ORAM and using it efficiently for secure computation. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 1–18. Springer, Heidelberg (2013)
    • (2013) PETS 2013. LNCS , vol.7981 , pp. 1-18
    • Gentry, C.1    Goldman, K.A.2    Halevi, S.3    Julta, C.4    Raykova, M.5    Wichs, D.6
  • 7
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431–473 (1996)
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 8
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • New York, USA
    • Goldreich, O.: Towards a theory of software protection and simulation by oblivious RAMs. In: Proceedings of Symposium on Theory of Computing, New York, USA, pp. 182–194 (1987)
    • (1987) Proceedings of Symposium on Theory of Computing , pp. 182-194
    • Goldreich, O.1
  • 9
    • 79960005023 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • In: Aceto, L., Henzinger, M., Sgall, J. (eds.), Springer, Heidelberg
    • Goodrich, M.T., Mitzenmacher, M.: Privacy-preserving access of outsourced data via oblivious RAM simulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576–587. Springer, Heidelberg (2011)
    • (2011) ICALP 2011, Part II. LNCS , vol.6756 , pp. 576-587
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 12
    • 0016930779 scopus 로고
    • Behavior of tandem buffers with geometric input and Markovian output
    • Hsu, J., Burke, P.: Behavior of tandem buffers with geometric input and Markovian output. IEEE Trans. Commun. 24(3), 358–361 (1976)
    • (1976) IEEE Trans. Commun , vol.24 , Issue.3 , pp. 358-361
    • Hsu, J.1    Burke, P.2
  • 13
    • 84860181777 scopus 로고    scopus 로고
    • On the (In)security of hash-based oblivious RAM and a new balancing scheme
    • Kyoto, Japan
    • Kushilevitz, E., Lu, S., Ostrovsky, R.: On the (in)security of hash-based oblivious RAM and a new balancing scheme. In: Proceedings of Symposium on Discrete Algorithms, Kyoto, Japan, pp. 143–156 (2012)
    • (2012) Proceedings of Symposium on Discrete Algorithms , pp. 143-156
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 16
    • 77957007201 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502–519. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 502-519
    • Pinkas, B.1    Reinman, T.2
  • 17
    • 82955173838 scopus 로고    scopus 로고
    • Oblivious RAM withO((logN)
    • In: Lee, D.H., Wang, X. (eds.), Springer, Heidelberg
    • 3) worst-case cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197–214. Springer, Heidelberg (2011)
    • (2011) ASIACRYPT 2011. LNCS , vol.7073 , pp. 197-214
    • Shi, E.1    Chan, T.-H.H.2    Stefanov, E.3    Li, M.4
  • 20
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Alexandra, USA
    • Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Conference on Computer and Communications Security, Alexandra, USA, pp. 139–148 (2008)
    • (2008) Conference on Computer and Communications Security , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.