메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 862-873

Constant communication ORAM with small blocksize

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; SECURITY OF DATA;

EID: 84954164499     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813701     Document Type: Conference Paper
Times cited : (44)

References (30)
  • 4
    • 84958553141 scopus 로고    scopus 로고
    • Scale-invariant fully homomorphic encryption over the integers
    • Springer
    • Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi. Scale-invariant fully homomorphic encryption over the integers. In Public-Key Cryptography-PKC 2014, pages 311-328. Springer, 2014.
    • (2014) Public-Key Cryptography-PKC 2014 , pp. 311-328
    • Coron, J.1    Lepoint, T.2    Tibouchi, M.3
  • 9
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • May
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473, May 1996. ISSN 0004-5411. doi: 10.1145/233551.233553. URL http://doi.acm.org/10.1145/233551.233553.
    • (1996) J ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 13
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • Miami Beach, USA
    • E. Kushilevitz and R. Ostrovsky. Replication is not Needed: Single Database, Computationally-Private Information Retrieval. In Proceedings of Foundations of Computer Science, pages 364-373, Miami Beach, USA, 1997.
    • (1997) Proceedings of Foundations of Computer Science , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 15
    • 33645970169 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • Singapore
    • H. Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In Proceedings of Information Security Conference, pages 314-328, Singapore, 2005.
    • (2005) Proceedings of Information Security Conference , pp. 314-328
    • Lipmaa, H.1
  • 24
    • 84983503986 scopus 로고    scopus 로고
    • RightScale. State of the cloud report, 2015. URL http://assets.rightscale.com/uploads/pdfs/RightScale-2015-State-of-the-Cloud-Report.pdf.
    • (2015) State of the Cloud Report
    • RightScale1
  • 29
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Alexandra, USA
    • P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In ACM Conference on Computer and Communications Security, pages 139-148, Alexandra, USA, 2008.
    • (2008) ACM Conference on Computer and Communications Security , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.