Secure Computation Towards Practical Applications
暂无分享,去创建一个
[1] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[2] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[3] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[4] Jacob T. Schwartz,et al. Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.
[5] Lior Malka,et al. VMCrypt: modular software architecture for scalable secure computation , 2011, CCS '11.
[6] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[7] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[8] Tal Malkin,et al. Malicious-Client Security in Blind Seer: A Scalable Private DBMS , 2015, 2015 IEEE Symposium on Security and Privacy.
[9] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[10] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[11] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[12] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[13] Arash Afshar,et al. How to Efficiently Evaluate RAM Programs with Malicious Security , 2014, EUROCRYPT.
[14] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[15] Claudio Orlandi,et al. A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..
[16] Tal Malkin,et al. Private search in the real world , 2011, ACSAC '11.
[17] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[18] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[19] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[20] Craig Gentry,et al. Private Database Access with HE-over-ORAM Architecture , 2015, ACNS.
[21] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[22] Tarik Moataz,et al. Boolean symmetric searchable encryption , 2013, ASIA CCS '13.
[23] Xiaomin Liu,et al. Fast Secure Computation of Set Intersection , 2010, SCN.
[24] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[25] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[26] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[27] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[28] Marcel Keller,et al. Efficient, Oblivious Data Structures for MPC , 2014, IACR Cryptol. ePrint Arch..
[29] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[30] Richard Zippel,et al. Probabilistic algorithms for sparse polynomials , 1979, EUROSAM.
[31] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[32] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[33] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[34] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[35] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[36] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[37] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[38] Ahmad-Reza Sadeghi,et al. Practical Secure Evaluation of Semi-Private Functions , 2009, IACR Cryptol. ePrint Arch..
[39] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[40] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[41] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[42] Michael Mitzenmacher,et al. Less hashing, same performance: Building a better Bloom filter , 2008 .
[43] Yuval Ishai,et al. OT-Combiners via Secure Computation , 2008, TCC.
[44] Yehuda Lindell,et al. Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings , 2014, CRYPTO.
[45] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[46] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[47] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[48] Vladimir Kolesnikov,et al. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions , 2008, Financial Cryptography.
[49] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[50] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, EUROCRYPT.
[51] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[52] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[53] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[54] Emiliano De Cristofaro,et al. Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information , 2011, TRUST.
[55] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[56] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[57] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[58] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[59] Matthew K. Franklin,et al. Efficiency Tradeoffs for Malicious Two-Party Computation , 2006, Public Key Cryptography.
[60] Jesper Buus Nielsen,et al. Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free , 2007, IACR Cryptol. ePrint Arch..
[61] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[62] Vladimir Kolesnikov,et al. Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits , 2012, SCN.
[63] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[64] Kartik Nayak,et al. Oblivious Data Structures , 2014, IACR Cryptol. ePrint Arch..
[65] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[66] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[67] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[68] Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries , 2013, CRYPTO.
[69] Hugo Krawczyk,et al. Outsourced symmetric private information retrieval , 2013, IACR Cryptol. ePrint Arch..
[70] Leslie G. Valiant,et al. Universal circuits (Preliminary Report) , 1976, STOC '76.
[71] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[72] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[73] Vladimir Kolesnikov. Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation , 2005, ASIACRYPT.
[74] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[75] Alex J. Malozemoff,et al. Amortizing Garbled Circuits , 2015, IACR Cryptol. ePrint Arch..
[76] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[77] Tal Malkin,et al. Secure anonymous database search , 2009, CCSW '09.
[78] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[79] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[80] Rafail Ostrovsky,et al. Garbled RAM Revisited , 2014, EUROCRYPT.