Oblivious RAM with O((logN)3) Worst-Case Cost
暂无分享,去创建一个
Elaine Shi | T.-H. Hubert Chan | Emil Stefanov | Mingfei Li | E. Shi | Emil Stefanov | Mingfei Li | T-H. Hubert Chan
[1] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[2] Michael T. Goodrich,et al. Oblivious RAM simulation with efficient worst-case access overhead , 2011, CCSW '11.
[3] Martin Raab,et al. "Balls into Bins" - A Simple and Tight Analysis , 1998, RANDOM.
[4] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[5] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[6] José D. P. Rolim,et al. Randomization and Approximation Techniques in Computer Science , 2002, Lecture Notes in Computer Science.
[7] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[8] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[9] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[10] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[11] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[12] P. Burke,et al. Behavior of Tandem Buffers with Geometric Input and Markovian Output , 1976, IEEE Trans. Commun..
[13] E. Szemerédi,et al. Sorting inc logn parallel steps , 1983 .
[14] János Komlós,et al. Sorting in c log n parallel sets , 1983, Comb..
[15] Paul Beame,et al. Making RAMs Oblivious Requires Superlogarithmic Overhead , 2010, Electron. Colloquium Comput. Complex..
[16] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[17] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[18] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[19] Tal Rabin. Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings , 2010, CRYPTO.
[20] Michael T. Goodrich,et al. MapReduce Parallel Cuckoo Hashing and Oblivious RAM Simulations , 2010, ArXiv.
[21] Peter Williams,et al. Usable PIR , 2008, NDSS.