Oblivious Parallel RAM and Applications
From MaRDI portal
Publication:2799095
DOI10.1007/978-3-662-49099-0_7zbMath1377.94039OpenAlexW2296049067MaRDI QIDQ2799095
Elette Boyle, Kai-Min Chung, Rafael Pass
Publication date: 8 April 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49099-0_7
Related Items (12)
Perfectly secure oblivious parallel RAM ⋮ A logarithmic lower bound for oblivious RAM (for all Parameters) ⋮ Delegating RAM Computations with Adaptive Soundness and Privacy ⋮ Adaptively secure garbling schemes for parallel computations ⋮ Collusion-resistant functional encryption for RAMs ⋮ Lower bound framework for differentially private and oblivious data structures ⋮ Random-index oblivious RAM ⋮ Limits of breach-resistant and snapshot-oblivious RAMs ⋮ Multi-client oblivious RAM with poly-logarithmic communication ⋮ Asymptotically Tight Bounds for Composing ORAM with PIR ⋮ Oblivious Parallel RAM: Improved Efficiency and Generic Constructions ⋮ Oblivious network RAM and leveraging parallelism to achieve obliviousness
Uses Software
Cites Work
- Unnamed Item
- Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
- How to Run Turing Machines on Encrypted Data
- Oblivious RAMs without cryptogrpahic assumptions
- Optimizing ORAM and Using It Efficiently for Secure Computation
- Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead
- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
- Succinct Garbling and Indistinguishability Obfuscation for RAM Programs
- Succinct Randomized Encodings and their Applications
- Garbled RAM From One-Way Functions
- Perfectly Secure Oblivious RAM without Random Oracles
- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
- Oblivious RAM with O((logN)3) Worst-Case Cost
- Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs
- Sorting in Average Time $o(\log \,n)$
- Relations Among Complexity Measures
- Software protection and simulation on oblivious RAMs
- Distributed Oblivious RAM for Secure Two-Party Computation
- Garbled RAM Revisited
This page was built for publication: Oblivious Parallel RAM and Applications