Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
暂无分享,去创建一个
Elaine Shi | Ling Ren | Emil Stefanov | Christopher W. Fletcher | Muhammad Naveed | E. Shi | Ling Ren | Emil Stefanov | Muhammad Naveed
[1] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[2] Srinivas Devadas,et al. Design space exploration and optimization of path oblivious RAM in secure processors , 2013, ISCA.
[3] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[4] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[5] Kai-Min Chung,et al. Statistically-secure ORAM with Õ(log2 n) Overhead , 2014, ASIACRYPT.
[6] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.
[7] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[8] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[9] Kartik Nayak,et al. ObliVM: A Programming Framework for Secure Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[10] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[11] Elaine Shi,et al. Constants Count: Practical Improvements to Oblivious RAM , 2015, USENIX Security Symposium.
[12] Elaine Shi,et al. Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns , 2014, USENIX Security Symposium.
[13] Rafail Ostrovsky,et al. Garbled RAM Revisited , 2014, EUROCRYPT.
[14] Peter Williams,et al. Usable PIR , 2008, NDSS.
[15] Johann-Christoph Freytag,et al. Almost Optimal Private Information Retrieval , 2002, Privacy Enhancing Technologies.
[16] Michael T. Goodrich,et al. Oblivious RAM simulation with efficient worst-case access overhead , 2011, CCSW '11.
[17] Sean W. Smith,et al. Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.
[18] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[19] Srinivas Devadas,et al. Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs , 2014, 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA).
[20] Craig Gentry,et al. Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[21] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[22] Rafail Ostrovsky,et al. Garbled RAM From One-Way Functions , 2015, STOC.
[23] Elaine Shi,et al. Verifiable Oblivious Storage , 2014, Public Key Cryptography.
[24] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[25] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[26] Elaine Shi,et al. Automating Efficient RAM-Model Secure Computation , 2014, 2014 IEEE Symposium on Security and Privacy.
[27] Peter Williams,et al. Single round access privacy on outsourced storage , 2012, CCS '12.
[28] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[29] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[30] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[31] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[32] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[33] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[34] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[35] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[36] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[37] Tarik Moataz,et al. Constant Communication ORAM with Small Blocksize , 2015, CCS.
[38] Sean W. Smith,et al. Practical server privacy with secure coprocessors , 2001, IBM Syst. J..
[39] Elaine Shi,et al. GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation , 2015, ASPLOS.
[40] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[41] Elaine Shi,et al. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.
[42] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[43] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.