Software protection and simulation on oblivious RAMs

From MaRDI portal
Publication:4371676

DOI10.1145/233551.233553zbMath0885.68041OpenAlexW1988374166WikidataQ56851226 ScholiaQ56851226MaRDI QIDQ4371676

Rafail Ostrovsky, Oded Goldreich

Publication date: 21 January 1998

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/1721.1/103684



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (only showing first 100 items - show all)

Large message homomorphic secret sharing from DCR and applicationsPerfectly secure oblivious parallel RAMHow to Compute in the Presence of LeakagePractical attacks against the walnut digital signature schemeSQL on structurally-encrypted databasesParameter-hiding order revealing encryptionA logarithmic lower bound for oblivious RAM (for all Parameters)Oblivious RAM with \textit{worst-case} logarithmic overheadPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeSecure Multiparty RAM Computation in Constant RoundsConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelEfficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized CostLarge-Scale Secure Computation: Multi-party Computation for (Parallel) RAM ProgramsAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseSecure Multi-party ShufflingEncrypted key-value storesA Secure Priority Queue; Or: On Secure Datastructures from Multiparty ComputationPerformance improvement for the GGM-construction of pseudorandom functionsSecure multi-party computation in large networksSingle-server private information retrieval with sublinear amortized timeThe function-inversion problem: barriers and opportunitiesStronger lower bounds for online ORAMData-Oblivious Graph Algorithms in Outsourced External MemoryOn Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsPrORAMA survey on design and implementation of protected searchable data in the cloudThe complexity of secure RAMsA theory of composition for differential obliviousnessM-ORAM Revisited: Security and Construction UpdatesKlee's measure problem made obliviousSnapshot-oblivious RAMs: sub-logarithmic efficiency for short transcriptsBalloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks3-party distributed ORAM from oblivious set membershipCollusion-resistant functional encryption for RAMsEfficient searchable symmetric encryption for join queriesWeighted oblivious RAM, with applications to searchable symmetric encryptionNanoGRAM: garbled RAM with \(\widetilde{O}(\log N)\) overheadLower bound framework for differentially private and oblivious data structuresPrivacy-enhanced attribute-based private information retrievalSuccinct arguments for RAM programs via projection codesEfficient Boolean search over encrypted data with reduced leakageOn compiling Boolean circuits optimized for secure multi-party computationSecret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programsLinear-time 2-party secure merge from additively homomorphic encryptionUnnamed ItemRandom-index oblivious RAMOne-time programs from commodity hardwareUnnamed Item\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHImproved hidden vector encryption with short ciphertexts and tokensOblivious RAM with worst-case logarithmic overheadForward secret encrypted RAM: lower bounds and applicationsPartitioned searchable encryptionLow-Leakage Secure Search for Boolean ExpressionsFree IF: how to omit inactive branches and implement \(\mathcal{S}\)-universal garbled circuit (almost) for freeSimple and efficient two-server ORAMMore is less: perfectly secure oblivious algorithms in the multi-server settingEffective error-tolerant keyword search for secure cloud computingAn Efficient PIR Construction Using Trusted HardwareImproved building blocks for secure multi-party computation based on secret sharing with honest majorityA low-cost memory remapping scheme for address bus protectionPrivacy-Preserving Access of Outsourced Data via Oblivious RAM SimulationSearchable symmetric encryption over multiple serversDynamic proofs of retrievability via oblivious RAMSecure computation without computersPublicly verifiable searchable symmetric encryption based on efficient cryptographic componentsConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelAsymptotically Tight Bounds for Composing ORAM with PIRSublinear Zero-Knowledge Arguments for RAM ProgramsConstant-round maliciously secure two-party computation in the RAM modelLower and upper bounds on obtaining history independenceObfuscation for cryptographic purposesEfficient cache attacks on AES, and countermeasuresOne-Time ProgramsIs there an oblivious RAM lower bound for online reads?Is there an oblivious RAM lower bound for online reads?Private Database Access with HE-over-ORAM ArchitectureOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMOblivious Parallel RAM and ApplicationsOblivious Parallel RAM: Improved Efficiency and Generic ConstructionsInformation-Theoretic Local Non-malleable Codes and Their ApplicationsPractical Techniques Building on Encryption for Protecting and Managing Data in the CloudLocally decodable and updatable non-malleable codes and their applicationsPrivacy-Preserving k-Nearest Neighbour Query on Outsourced DatabaseLocality-preserving oblivious RAMAlibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solutionStructured encryption and dynamic leakage suppressionTwo-server distributed ORAM with sublinear computation and constant roundsTWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable EncryptionOblivious network RAM and leveraging parallelism to achieve obliviousnessFounding Cryptography on Tamper-Proof Hardware TokensLower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe modelUnnamed ItemUnnamed ItemPrivate Information Retrieval Using Trusted HardwarePseudorandom Functions: Three Decades LaterBoolean Searchable Symmetric Encryption with Worst-Case Sub-linear ComplexityPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareOptORAMa: optimal oblivious RAM\textsf{MacORAMa}: optimal oblivious RAM with integrity




This page was built for publication: Software protection and simulation on oblivious RAMs