How to Garble RAM Programs
暂无分享,去创建一个
[1] Silvio Micali,et al. The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.
[2] Michael J. Fischer,et al. Relations Among Complexity Measures , 1979, JACM.
[3] Jonathan Katz,et al. On the Security of the Free-XOR Technique , 2012, IACR Cryptol. ePrint Arch..
[4] Rafail Ostrovsky,et al. Public-Key Encryption with Efficient Amortized Updates , 2010, SCN.
[5] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[6] V. Rich. Personal communication , 1989, Nature.
[7] Peter Williams,et al. Usable PIR , 2008, NDSS.
[8] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[9] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[10] Stephen A. Cook,et al. Time-bounded random access machines , 1972, J. Comput. Syst. Sci..
[11] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[12] Radu Sion,et al. Oblivious remote data access made practical , 2012 .
[13] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[14] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[15] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[16] Michael T. Goodrich,et al. Oblivious RAM simulation with efficient worst-case access overhead , 2011, CCSW '11.
[17] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[18] Mihir Bellare,et al. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing , 2012, ASIACRYPT.
[19] Miklós Ajtai,et al. Oblivious RAMs without cryptogrpahic assumptions , 2010, STOC '10.
[20] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[21] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[22] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[23] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[24] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[25] Yael Tauman Kalai,et al. Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond , 2012, IACR Cryptol. ePrint Arch..
[26] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[27] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[28] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[29] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[30] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[31] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[32] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[33] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[34] Moni Naor,et al. Communication preserving protocols for secure function evaluation , 2001, STOC '01.
[35] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[36] Peter Williams,et al. Single round access privacy on outsourced storage , 2012, CCS '12.
[37] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.