Optimizing ORAM and Using It Efficiently for Secure Computation

From MaRDI portal
Publication:2876659

DOI10.1007/978-3-642-39077-7_1zbMath1315.94075OpenAlexW2096379058MaRDI QIDQ2876659

Kenny A. Goldman, Daniel Wichs, Shai Halevi, Mariana Raykova, Charanjit Julta, Craig Gentry

Publication date: 19 August 2014

Published in: Privacy Enhancing Technologies (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-39077-7_1




Related Items (24)

Perfectly secure oblivious parallel RAMSQL on structurally-encrypted databasesA logarithmic lower bound for oblivious RAM (for all Parameters)Unnamed ItemConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelLarge-Scale Secure Computation: Multi-party Computation for (Parallel) RAM ProgramsStronger lower bounds for online ORAMData-Oblivious Graph Algorithms in Outsourced External MemoryEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsSnapshot-oblivious RAMs: sub-logarithmic efficiency for short transcriptsNanoGRAM: garbled RAM with \(\widetilde{O}(\log N)\) overheadSecret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programsRandom-index oblivious RAMSimple and efficient two-server ORAMAsymptotically Tight Bounds for Composing ORAM with PIRConstant-round maliciously secure two-party computation in the RAM modelIs there an oblivious RAM lower bound for online reads?Is there an oblivious RAM lower bound for online reads?Private Database Access with HE-over-ORAM ArchitectureOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMOblivious Parallel RAM and ApplicationsOblivious Parallel RAM: Improved Efficiency and Generic ConstructionsTWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable EncryptionOblivious network RAM and leveraging parallelism to achieve obliviousness




This page was built for publication: Optimizing ORAM and Using It Efficiently for Secure Computation