Constants Count: Practical Improvements to Oblivious RAM
暂无分享,去创建一个
Elaine Shi | Srinivas Devadas | Marten van Dijk | Ling Ren | Emil Stefanov | Albert Kwon | Christopher W. Fletcher | E. Shi | S. Devadas | Ling Ren | Albert Kwon | Emil Stefanov
[1] Travis Mayberry,et al. Efficient Private File Retrieval by Combining ORAM and PIR , 2014, NDSS.
[2] Srinivas Devadas,et al. Design space exploration and optimization of path oblivious RAM in secure processors , 2013, ISCA.
[3] Joshua Schiffman,et al. Shroud: ensuring private access to large-scale data in the data center , 2013, FAST.
[4] Srinivas Devadas,et al. Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs , 2014, 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA).
[5] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[6] Tao Zhang,et al. HIDE: an infrastructure for efficiently protecting information leakage on the address bus , 2004, ASPLOS XI.
[7] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[8] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[9] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[10] Elaine Shi,et al. Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns , 2014, USENIX Security Symposium.
[11] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[12] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.
[13] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[14] Oded Goldreich,et al. Towards a Theory of Software Protection , 1986, CRYPTO.
[15] Srinivas Devadas,et al. Generalized external interaction with tamper-resistant hardware with bounded information leakage , 2013, CCSW.
[16] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[17] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[18] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[19] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[20] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[21] Elaine Shi,et al. GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation , 2015, ASPLOS.
[22] Peter Williams,et al. Single round access privacy on outsourced storage , 2012, CCS '12.
[23] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[24] Srinivas Devadas,et al. A Low-Latency, Low-Area Hardware Oblivious RAM Controller , 2015, 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines.
[25] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[26] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[27] Srinivas Devadas,et al. Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM , 2015 .
[28] Elaine Shi,et al. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.
[29] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[30] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[31] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.