Black-Box Parallel Garbled RAM
暂无分享,去创建一个
[1] Allison Bishop,et al. Indistinguishability Obfuscation for Turing Machines with Unbounded Memory , 2015, IACR Cryptol. ePrint Arch..
[2] Rafail Ostrovsky,et al. Garbled RAM Revisited , 2014, EUROCRYPT.
[3] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[4] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[5] Craig Gentry,et al. Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[6] Kai-Min Chung,et al. Cryptography for Parallel RAM from Indistinguishability Obfuscation , 2016, ITCS.
[7] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[8] Stefano Tessaro,et al. Oblivious Parallel RAM: Improved Efficiency and Generic Constructions , 2016, TCC.
[9] Peihan Miao. Cut-and-Choose for Garbled RAM , 2016, IACR Cryptol. ePrint Arch..
[10] Rafail Ostrovsky,et al. Black-Box Garbled RAM , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[11] Nir Bitansky,et al. Succinct Randomized Encodings and their Applications , 2015, IACR Cryptol. ePrint Arch..
[12] Ran Canetti,et al. Succinct Garbling and Indistinguishability Obfuscation for RAM Programs , 2015, STOC.
[13] Rafail Ostrovsky,et al. Adaptively Secure Garbled Circuits from One-Way Functions , 2016, CRYPTO.
[14] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[15] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[16] Rafail Ostrovsky,et al. Garbled RAM From One-Way Functions , 2015, STOC.
[17] Kai-Min Chung,et al. Computation-Trace Indistinguishability Obfuscation and its Applications , 2015, IACR Cryptol. ePrint Arch..
[18] Ran Canetti,et al. Adaptive Succinct Garbled RAM or: How to Delegate Your Database , 2016, TCC.
[19] Sanjam Garg,et al. Secure Multiparty RAM Computation in Constant Rounds , 2016, TCC.
[20] Ran Canetti,et al. Fully Succinct Garbled RAM , 2016, ITCS.
[21] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[22] Kai-Min Chung,et al. Oblivious Parallel RAM and Applications , 2016, TCC.
[23] Kai-Min Chung,et al. Delegating RAM Computations with Adaptive Soundness and Privacy , 2016, TCC.