메뉴 건너뛰기




Volumn , Issue , 2015, Pages 415-430

Constants count: Practical improvements to oblivious RAM

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTATION THEORY; PROGRAM PROCESSORS;

EID: 85076291337     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (147)

References (32)
  • 2
    • 82955204091 scopus 로고    scopus 로고
    • Perfectly secure oblivious RAM without random oracles
    • DAMGÅRD, I., MELDGAARD, S., AND NIELSEN, J. B. Perfectly secure oblivious RAM without random oracles. In TCC (2011).
    • (2011) TCC
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 3
    • 84937774864 scopus 로고    scopus 로고
    • Burst oram: Minimizing oram response times for bursty access patterns
    • DAUTRICH, J., STEFANOV, E., AND SHI, E. Burst oram: Minimizing oram response times for bursty access patterns. In USENIX (2014).
    • (2014) USENIX
    • Dautrich, J.1    Stefanov, E.2    Shi, E.3
  • 5
    • 84939193220 scopus 로고    scopus 로고
    • Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram
    • FLETCHER, C., REN, L., KWON, A., VAN DIJK, M., AND DEVADAS, S. Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram. In ASPLOS (2015).
    • (2015) ASPLOS
    • Fletcher, C.1    Ren, L.2    Kwon, A.3    Van Dijk, M.4    Devadas, S.5
  • 7
    • 84904012684 scopus 로고    scopus 로고
    • Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs
    • FLETCHER, C., REN, L., YU, X., VAN DIJK, M., KHAN, O., AND DEVADAS, S. Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs. In HPCA (2014).
    • (2014) HPCA
    • Fletcher, C.1    Ren, L.2    Yu, X.3    Van Dijk, M.4    Khan, O.5    Devadas, S.6
  • 8
    • 84881225045 scopus 로고    scopus 로고
    • Secure processor architecture for encrypted computation on untrusted programs
    • FLETCHER, C., VAN DIJK, M., AND DEVADAS, S. Secure Processor Architecture for Encrypted Computation on Untrusted Programs. In STC (2012).
    • (2012) STC
    • Fletcher, C.1    Van Dijk, M.2    Devadas, S.3
  • 10
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation on oblivious rams
    • GOLDREICH, O. Towards a theory of software protection and simulation on oblivious rams. In STOC (1987).
    • (1987) STOC
    • Goldreich, O.1
  • 11
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • GOLDREICH, O., AND OSTROVSKY, R. Software protection and simulation on oblivious rams. In J. ACM (1996).
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 12
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious ram simulation
    • GOODRICH, M. T., AND MITZENMACHER, M. Privacy-preserving access of outsourced data via oblivious ram simulation. In ICALP (2011).
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 13
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving group data access via stateless oblivious RAM simulation
    • GOODRICH, M. T., MITZENMACHER, M., OHRIMENKO, O., AND TAMASSIA, R. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA (2012).
    • (2012) SODA
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 14
    • 85179556059 scopus 로고    scopus 로고
    • Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
    • ISLAM, M., KUZU, M., AND KANTARCIOGLU, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS (2012).
    • (2012) NDSS
    • Islam, M.1    Kuzu, M.2    Kantarcioglu, M.3
  • 15
    • 84860181777 scopus 로고    scopus 로고
    • On the (in) security of hash-based oblivious ram and a new balancing scheme
    • KUSHILEVITZ, E., LU, S., AND OSTROVSKY, R. On the (in) security of hash-based oblivious ram and a new balancing scheme. In SODA (2012).
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 16
    • 84939198646 scopus 로고    scopus 로고
    • Ghostrider: A hardware-software system for memory trace oblivious computation
    • LIU, C., HARRIS, A., MAAS, M., HICKS, M., TIWARI, M., AND SHI, E. Ghostrider: A hardware-software system for memory trace oblivious computation. In ASPLOS (2015).
    • (2015) ASPLOS
    • Liu, C.1    Harris, A.2    Maas, M.3    Hicks, M.4    Tiwari, M.5    Shi, E.6
  • 17
    • 84890416103 scopus 로고    scopus 로고
    • Shroud: Ensuring private access to large-scale data in the data center
    • LORCH, J. R., PARNO, B., MICKENS, J. W., RAYKOVA, M., AND SCHIFFMAN, J. Shroud: Ensuring private access to large-scale data in the data center. In FAST (2013).
    • (2013) FAST
    • Lorch, J.R.1    Parno, B.2    Mickens, J.W.3    Raykova, M.4    Schiffman, J.5
  • 19
    • 85091187696 scopus 로고    scopus 로고
    • Efficient private file retrieval by combining oram and pir
    • MAYBERRY, T., BLASS, E.-O., AND CHAN, A. H. Efficient private file retrieval by combining oram and pir. In NDSS (2014).
    • (2014) NDSS
    • Mayberry, T.1    Blass, E.-O.2    Chan, A.H.3
  • 20
    • 82955198779 scopus 로고
    • Efficient computation on oblivious rams
    • OSTROVSKY, R. Efficient computation on oblivious rams. In STOC (1990).
    • (1990) STOC
    • Ostrovsky, R.1
  • 21
    • 84899079157 scopus 로고    scopus 로고
    • Private information storage (extended abstract)
    • OSTROVSKY, R., AND SHOUP, V. Private information storage (extended abstract). In STOC (1997).
    • (1997) STOC
    • Ostrovsky, R.1    Shoup, V.2
  • 22
    • 84881169695 scopus 로고    scopus 로고
    • Design space exploration and optimization of path oblivious ram in secure processors
    • REN, L., YU, X., FLETCHER, C., VAN DIJK, M., AND DEVADAS, S. Design space exploration and optimization of path oblivious ram in secure processors. In ISCA (2013).
    • (2013) ISCA
    • Ren, L.1    Yu, X.2    Fletcher, C.3    Van Dijk, M.4    Devadas, S.5
  • 24
    • 84881250193 scopus 로고    scopus 로고
    • Oblivistore: High performance oblivious cloud storage
    • STEFANOV, E., AND SHI, E. Oblivistore: High performance oblivious cloud storage. In S&P (2013).
    • (2013) S&P
    • Stefanov, E.1    Shi, E.2
  • 25
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • STEFANOV, E., SHI, E., AND SONG, D. Towards practical oblivious RAM. In NDSS (2012).
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 28
    • 84945241357 scopus 로고    scopus 로고
    • Circuit oram: On tightness of the goldreich-ostrovsky lower bound
    • WANG, X. S., CHAN, T.-H. H., AND SHI, E. Circuit oram: On tightness of the goldreich-ostrovsky lower bound. Cryptology ePrint Archive, 2014. http://eprint.iacr.org/2014/672.
    • (2014) Cryptology ePrint Archive
    • Wang, X.S.1    Chan, T.-H.H.2    Shi, E.3
  • 29
    • 84869381921 scopus 로고    scopus 로고
    • Single round access privacy on outsourced storage
    • WILLIAMS, P., AND SION, R. Single round access privacy on outsourced storage. In CCS (2012).
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 30
    • 84869453208 scopus 로고    scopus 로고
    • PrivateFS: A parallel oblivious file system
    • WILLIAMS, P., SION, R., AND TOMESCU, A. Privatefs: A parallel oblivious file system. In CCS (2012).
    • (2012) CCS
    • Williams, P.1    Sion, R.2    Tomescu, A.3
  • 31
    • 84888985277 scopus 로고    scopus 로고
    • Generalized external interaction with tamper-resistant hardware with bounded information leakage
    • YU, X., FLETCHER, C. W., REN, L., VAN DIJK, M., AND DEVADAS, S. Generalized external interaction with tamper-resistant hardware with bounded information leakage. In CCSW (2013).
    • (2013) CCSW
    • Yu, X.1    Fletcher, C.W.2    Ren, L.3    Van Dijk, M.4    Devadas, S.5
  • 32
    • 12844260675 scopus 로고    scopus 로고
    • Hide: An infrastructure for efficiently protecting information leakage on the address bus
    • ZHUANG, X., ZHANG, T., AND PANDE, S. HIDE: an infrastructure for efficiently protecting information leakage on the address bus. In ASPLOS (2004).
    • (2004) ASPLOS
    • Zhuang, X.1    Zhang, T.2    Pande, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.