TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
From MaRDI portal
Publication:2829960
DOI10.1007/978-3-662-53015-3_20zbMath1406.94056OpenAlexW2481158741MaRDI QIDQ2829960
Charalampos Papamanthou, Payman Mohassel, Sanjam Garg
Publication date: 9 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53015-3_20
Related Items (10)
SQL on structurally-encrypted databases ⋮ Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time ⋮ Weighted oblivious RAM, with applications to searchable symmetric encryption ⋮ Exipnos: an efficient verifiable dynamic symmetric searchable encryption scheme with forward and backward privacy ⋮ Simple and efficient two-server ORAM ⋮ Asymptotically Tight Bounds for Composing ORAM with PIR ⋮ Backward private dynamic searchable encryption with update pattern ⋮ Structured encryption and dynamic leakage suppression ⋮ Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model ⋮ Improved structured encryption for SQL databases via hybrid indexing
Cites Work
- Unnamed Item
- A proof of security of Yao's protocol for two-party computation
- Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- Optimizing ORAM and Using It Efficiently for Secure Computation
- Garbled RAM From One-Way Functions
- How to Efficiently Evaluate RAM Programs with Malicious Security
- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
- Structured Encryption and Controlled Disclosure
- Oblivious RAM with O((logN)3) Worst-Case Cost
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Predicate Privacy in Encryption Systems
- Software protection and simulation on oblivious RAMs
- Distributed Oblivious RAM for Secure Two-Party Computation
- How to Garble RAM Programs?
- Garbled RAM Revisited
This page was built for publication: TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption