Combining ORAM with PIR to Minimize Bandwidth Costs
暂无分享,去创建一个
[1] Andy Parrish,et al. Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups , 2010, ISC.
[2] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[3] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[4] 日経BP社,et al. Amazon Web Services完全ソリューションガイド , 2016 .
[5] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[6] Elaine Shi,et al. Multi-cloud oblivious storage , 2013, CCS.
[7] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[8] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[9] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.
[10] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[11] Chinya V. Ravishankar,et al. Compromising privacy in precise query protocols , 2013, EDBT '13.
[12] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[13] Jonathan L. Dautrich. Achieving Practical Access Pattern Privacy in Data Outsourcing , 2014 .
[14] Elaine Shi,et al. Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns , 2014, USENIX Security Symposium.
[15] Craig Gentry,et al. Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.
[16] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[17] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[18] Murat Kantarcioglu,et al. Inference attack against encrypted range queries on outsourced databases , 2014, CODASPY '14.
[19] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[20] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[21] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[22] Travis Mayberry,et al. Efficient Private File Retrieval by Combining ORAM and PIR , 2014, NDSS.