Efficient Oblivious Data Structures for Database Services on the Cloud
暂无分享,去创建一个
Attila A. Yavuz | Ceyhun D. Ozkaptan | Thang Hoang | Gabriel Hackebeil | Thang Hoang | A. Yavuz | Gabriel Hackebeil
[1] Yantian Hou,et al. Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index , 2014, AsiaCCS.
[2] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[3] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[4] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[5] Stefano Tessaro,et al. Oblivious Parallel RAM: Improved Efficiency and Generic Constructions , 2016, TCC.
[6] Jorge Guajardo,et al. Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware , 2015, SAC.
[7] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[8] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[9] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[10] Yan Huang,et al. Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward , 2015, CCS.
[11] Srinivas Devadas,et al. Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs , 2014, 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA).
[12] Jonathan Katz,et al. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.
[13] Kartik Nayak,et al. Oblivious Data Structures , 2014, IACR Cryptol. ePrint Arch..
[14] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[15] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[16] Liehuang Zhu,et al. Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..
[17] Feifei Li,et al. Oblivious RAM: A Dissection and Experimental Evaluation , 2016, Proc. VLDB Endow..
[18] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[19] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[20] Chinya V. Ravishankar,et al. Combining ORAM with PIR to Minimize Bandwidth Costs , 2015, CODASPY.
[21] Ankur Srivastava,et al. Exploring timing side-channel attacks on path-ORAMs , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[22] Elaine Shi,et al. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.
[23] Moni Naor,et al. Is There an Oblivious RAM Lower Bound? , 2016, ITCS.
[24] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[25] Keqin Li,et al. Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data , 2017, IEEE Transactions on Cloud Computing.
[26] Jorge Guajardo,et al. Practical and secure dynamic searchable encryption via oblivious access on distributed data structure , 2016, ACSAC.
[27] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[28] Elaine Shi,et al. Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM , 2014, IACR Cryptol. ePrint Arch..
[29] Haitao Wang,et al. Geometric Range Search on Encrypted Spatial Data , 2016, IEEE Transactions on Information Forensics and Security.
[30] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[31] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[32] Charles V. Wright,et al. The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption , 2016, CCS.
[33] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[34] Ling Liu,et al. Oblivious Multi-Keyword Search for Secure Cloud Storage Service , 2017, 2017 IEEE International Conference on Web Services (ICWS).