Oblivious Data Structures
暂无分享,去创建一个
Kartik Nayak | Elaine Shi | Yan Huang | Chang Liu | Emil Stefanov | Xiao Wang | E. Shi | Kartik Nayak | Emil Stefanov | Chang Liu | Yan Huang | X. Wang
[1] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[2] Danfeng Zhang,et al. Predictive black-box mitigation of timing channels , 2010, CCS '10.
[3] P. Assouad. Plongements lipschitziens dans Rn , 2003 .
[4] Kenneth L. Clarkson,et al. Nearest Neighbor Queries in Metric Spaces , 1997, STOC '97.
[5] Guy E. Blelloch,et al. Strongly History-Independent Hashing with Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[6] Srinivas Devadas,et al. Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness , 2014, IACR Cryptol. ePrint Arch..
[7] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[8] P. Assouad. Plongements lipschitziens dans ${\bbfR}\sp n$ , 1983 .
[9] D. Golovin,et al. Linear Equations Modulo 2 and the L1 Diameter of Convex Bodies , 2007, FOCS 2007.
[10] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[11] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[12] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[13] Michael T. Goodrich,et al. Practical oblivious storage , 2012, CODASPY '12.
[14] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[15] John C. Mitchell,et al. Data-Oblivious Data Structures , 2014, STACS.
[16] Mark de Berg,et al. Computational geometry: algorithms and applications , 1997 .
[17] Kai-Min Chung,et al. Statistically-secure ORAM with Õ(log2 n) Overhead , 2014, ASIACRYPT.
[18] David Evans,et al. Circuit Structures for Improving Efficiency of Security and Privacy Tools , 2013, 2013 IEEE Symposium on Security and Privacy.
[19] Michael T. Goodrich,et al. Oblivious RAM simulation with efficient worst-case access overhead , 2011, CCSW '11.
[20] Marcel Keller,et al. Efficient, Oblivious Data Structures for MPC , 2014, IACR Cryptol. ePrint Arch..
[21] Abhi Shelat,et al. Efficient Secure Computation with Garbled Circuits , 2011, ICISS.
[22] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[23] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[24] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[25] Moni Naor,et al. De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results , 2009, ICALP.
[26] Tao Zhang,et al. HIDE: an infrastructure for efficiently protecting information leakage on the address bus , 2004, ASPLOS XI.
[27] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[28] Peter Williams,et al. Usable PIR , 2008, NDSS.
[29] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[30] Elaine Shi,et al. Automating Efficient RAM-Model Secure Computation , 2014, 2014 IEEE Symposium on Security and Privacy.
[31] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[32] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[33] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[34] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[35] Danfeng Zhang,et al. Predictive mitigation of timing channels in interactive systems , 2011, CCS '11.
[36] Ziv Bar-Yossef,et al. Random sampling from a search engine's index , 2006, WWW '06.
[37] David Eppstein,et al. Privacy-preserving data-oblivious geometric algorithms for geographic data , 2010, GIS '10.
[38] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[39] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[40] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.
[41] Tomas Toft. Secure data structures based on multi-party computation , 2011, PODC '11.
[42] Marina Blanton,et al. Data-oblivious graph algorithms for secure computation and outsourcing , 2013, ASIA CCS '13.
[43] Mihir Bellare,et al. Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.
[44] Robert Krauthgamer,et al. Bounded geometries, fractals, and low-distortion embeddings , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[45] Daniele Micciancio,et al. Oblivious data structures: applications to cryptography , 1997, STOC '97.
[46] Peter Williams,et al. Single round access privacy on outsourced storage , 2012, CCS '12.
[47] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[48] Danfeng Zhang,et al. Language-based control and mitigation of timing channels , 2012, PLDI.
[49] R. Tarjan,et al. A Separator Theorem for Planar Graphs , 1977 .
[50] Michael J. Fischer,et al. Relations Among Complexity Measures , 1979, JACM.
[51] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[52] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[53] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[54] D. R. Fulkerson,et al. Maximal Flow Through a Network , 1956 .
[55] Stratis Ioannidis,et al. Privacy-preserving matrix factorization , 2013, CCS.
[56] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[57] Michael T. Goodrich,et al. Data-Oblivious Graph Drawing Model and Algorithms , 2012, ArXiv.
[58] Elaine Shi,et al. Memory Trace Oblivious Program Execution , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.