Efficient, oblivious data structures for MPC
From MaRDI portal
Publication:2936626
Recommendations
Cited in
(22)- Breaking the linear-memory barrier in MPC: fast MIS on trees with strongly sublinear memory
- Is there an oblivious RAM lower bound for online reads?
- Data-oblivious graph algorithms in outsourced external memory
- Practically efficient secure single-commodity multi-market auctions
- Improved building blocks for secure multi-party computation based on secret sharing with honest majority
- Private database access with HE-over-ORAM architecture
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- Constant-round maliciously secure two-party computation in the RAM model
- DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
- Reducing the Overhead of MPC over a Large Population
- Privacy-preserving \(k\)-nearest neighbour query on outsourced database
- Asymptotically tight bounds for composing ORAM with PIR
- Is there an oblivious RAM lower bound for online reads?
- Private liquidity matching using MPC
- PGAS: privacy-preserving graph encryption for accurate constrained shortest distance queries
- Constant-round maliciously secure two-party computation in the RAM model
- Oblivious parallel tight compaction
- Practically efficient multi-party sorting protocols from comparison sort algorithms
- Going beyond dual execution: MPC for functions with efficient verification
- Privacy-preserving Dijkstra
- Secret-shared shuffle
- The oblivious machine. Or: how to put the C into MPC
This page was built for publication: Efficient, oblivious data structures for MPC
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936626)