Cryptography for Parallel RAM from Indistinguishability Obfuscation
暂无分享,去创建一个
Kai-Min Chung | Sherman S. M. Chow | Yu-Chi Chen | Hong-Sheng Zhou | Russell W. F. Lai | Wei-Kai Lin | Hong-Sheng Zhou | Kai-Min Chung | Wei-Kai Lin | Yu-Chi Chen
[1] Ran Canetti,et al. Fully Succinct Garbled RAM , 2016, ITCS.
[2] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[3] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[4] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[5] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[6] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[7] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[8] Ran Canetti,et al. Succinct Garbling and Indistinguishability Obfuscation for RAM Programs , 2015, STOC.
[9] Kai-Min Chung,et al. A Simple ORAM , 2013, IACR Cryptol. ePrint Arch..
[10] Michael J. Fischer,et al. Relations Among Complexity Measures , 1979, JACM.
[11] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[12] Brent Waters,et al. Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.
[13] Allison Bishop,et al. Indistinguishability Obfuscation for Turing Machines with Unbounded Memory , 2015, IACR Cryptol. ePrint Arch..
[14] Kai-Min Chung,et al. Large-Scale Secure Computation , 2014, IACR Cryptol. ePrint Arch..
[15] Kai-Min Chung,et al. Oblivious Parallel RAM , 2014, IACR Cryptol. ePrint Arch..
[16] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[17] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.
[18] Kai-Min Chung,et al. Oblivious Parallel RAM and Applications , 2016, TCC.
[19] Rafail Ostrovsky,et al. Black-Box Parallel Garbled RAM , 2015, CRYPTO.
[20] Kai-Min Chung,et al. Delegating RAM Computations with Adaptive Soundness and Privacy , 2016, TCC.
[21] Amit Sahai,et al. Functional Encryption for Turing Machines , 2016, TCC.
[22] Kai-Min Chung,et al. Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs , 2015, CRYPTO.
[23] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[24] Craig Gentry,et al. Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[25] Nir Bitansky,et al. Succinct Randomized Encodings and their Applications , 2015, IACR Cryptol. ePrint Arch..
[26] Stefano Tessaro,et al. Oblivious Parallel RAM: Improved Efficiency and Generic Constructions , 2016, TCC.
[27] Ran Canetti,et al. Succinct Adaptive Garbled RAM , 2015, IACR Cryptol. ePrint Arch..
[28] Aggelos Kiayias,et al. Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..
[29] Yuval Ishai,et al. Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[30] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.