Alibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solution
From MaRDI portal
Publication:2056797
Cites work
- scientific article; zbMATH DE number 1559545 (Why is no real title available?)
- Cuckoo hashing
- Data-oblivious data structures
- Distributed Oblivious RAM for Secure Two-Party Computation
- More robust hashing: cuckoo hashing with a stash
- Oblivious RAM Revisited
- Oblivious RAM with \(O((\log N)^{3})\) worst-case cost
- Oblivious hashing revisited, and applications to asymptotically efficient ORAM and OPRAM
- On the (in)security of hash-based oblivious RAM and a new balancing scheme
- OptORAMa: optimal oblivious RAM
- Privacy-preserving access of outsourced data via oblivious RAM simulation
- Privacy-preserving group data access via stateless oblivious RAM simulation
- Software protection and simulation on oblivious RAMs
- Some Open Questions Related to Cuckoo Hashing
- Sub-logarithmic distributed oblivious RAM with small block size
Cited in
(8)- 3-party distributed ORAM from oblivious set membership
- Generalized cuckoo hashing with a stash, revisited
- OptORAMa: Optimal oblivious RAM
- Cuckoo hashing in cryptography: optimal parameters, robustness and applications
- 3-party secure computation for RAMs: optimal and concretely efficient
- DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
- SSE and SSD: page-efficient searchable symmetric encryption
- Oblivious RAM with worst-case logarithmic overhead
This page was built for publication: Alibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056797)