Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
暂无分享,去创建一个
[1] Robert H. Deng,et al. Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..
[2] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[3] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[4] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[5] Elaine Shi,et al. Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns , 2014, USENIX Security Symposium.
[6] Michael T. Goodrich,et al. Oblivious Storage with Low I/O Overhead , 2011, ArXiv.
[7] Michael T. Goodrich,et al. Practical oblivious storage , 2012, CODASPY '12.
[8] Kai-Min Chung,et al. Statistically-secure ORAM with Õ(log2 n) Overhead , 2014, ASIACRYPT.
[9] Kai-Min Chung,et al. Oblivious Parallel RAM , 2014, IACR Cryptol. ePrint Arch..
[10] Joshua Schiffman,et al. Shroud: ensuring private access to large-scale data in the data center , 2013, FAST.
[11] Elaine Shi,et al. Constants Count: Practical Improvements to Oblivious RAM , 2015, USENIX Security Symposium.
[12] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[13] R. Serfozo. Basics of Applied Stochastic Processes , 2012 .
[14] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[15] Michael T. Goodrich,et al. Oblivious RAM simulation with efficient worst-case access overhead , 2011, CCSW '11.
[16] Srinivas Devadas,et al. Design space exploration and optimization of path oblivious RAM in secure processors , 2013, ISCA.
[17] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[18] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[19] Michael T. Goodrich,et al. Cache-Oblivious Dictionaries and Multimaps with Negligible Failure Probability , 2012, MedAlg.
[20] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[21] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[22] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[23] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[24] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[25] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[26] Srinivas Devadas,et al. Towards an interpreter for efficient encrypted computation , 2012, CCSW '12.
[27] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[28] Kai-Min Chung,et al. A Simple ORAM , 2013, IACR Cryptol. ePrint Arch..
[29] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[30] Oded Goldreich,et al. Towards a Theory of Software Protection , 1986, CRYPTO.
[31] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.