Efficient 3-Party Distributed ORAM
暂无分享,去创建一个
Rafail Ostrovsky | Jonathan Katz | Eyal Kushilevitz | Paul Bunn | Jonathan Katz | R. Ostrovsky | E. Kushilevitz | Paul Bunn
[1] Stanislaw Jarecki,et al. 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval , 2018, IACR Cryptol. ePrint Arch..
[2] Sanjam Garg,et al. Secure Multiparty RAM Computation in Constant Rounds , 2016, TCC.
[3] Peter Williams,et al. Single round access privacy on outsourced storage , 2012, CCS '12.
[4] Arash Afshar,et al. How to Efficiently Evaluate RAM Programs with Malicious Security , 2014, EUROCRYPT.
[5] Yuval Ishai,et al. Function Secret Sharing: Improvements and Extensions , 2016, CCS.
[6] Marcel Keller,et al. Efficient Maliciously Secure Multiparty Computation for RAM , 2018, IACR Cryptol. ePrint Arch..
[7] Stratis Ioannidis,et al. GraphSC: Parallel Secure Computation Made Easy , 2015, 2015 IEEE Symposium on Security and Privacy.
[8] Elaine Shi,et al. Automating Efficient RAM-Model Secure Computation , 2014, 2014 IEEE Symposium on Security and Privacy.
[9] Travis Mayberry,et al. Efficient Private File Retrieval by Combining ORAM and PIR , 2014, NDSS.
[10] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[11] Jonathan Katz,et al. Simple and Efficient Two-Server ORAM , 2018, IACR Cryptol. ePrint Arch..
[12] Jonathan Katz,et al. Secure Computation of MIPS Machine Code , 2016, ESORICS.
[13] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[14] Stanislaw Jarecki,et al. Three-Party ORAM for Secure Computation , 2015, ASIACRYPT.
[15] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[16] Jonathan Katz,et al. Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[17] Yuval Ishai,et al. Function Secret Sharing , 2015, EUROCRYPT.
[18] Elaine Shi,et al. Verifiable Oblivious Storage , 2014, Public Key Cryptography.
[19] Abhi Shelat,et al. SCORAM: Oblivious RAM for Secure Computation , 2014, IACR Cryptol. ePrint Arch..
[20] Kartik Nayak,et al. Asymptotically Tight Bounds for Composing ORAM with PIR , 2017, Public Key Cryptography.
[21] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[22] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[23] Yuval Ishai,et al. Distributed Point Functions and Their Applications , 2014, EUROCRYPT.
[24] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[25] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[26] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[27] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[28] Eyal Kushilevitz,et al. Sub-logarithmic Distributed Oblivious RAM with Small Block Size , 2019, IACR Cryptol. ePrint Arch..
[29] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[30] Elaine Shi,et al. Constants Count: Practical Improvements to Oblivious RAM , 2015, USENIX Security Symposium.
[31] Carmit Hazay,et al. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model , 2019, Journal of Cryptology.
[32] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[33] Abhi Shelat,et al. Scaling ORAM for Secure Computation , 2017, IACR Cryptol. ePrint Arch..
[34] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[35] Rafail Ostrovsky,et al. Private Information Storage , 1996, IACR Cryptol. ePrint Arch..