Distributed Oblivious RAM for Secure Two-Party Computation

From MaRDI portal
Publication:4910289

DOI10.1007/978-3-642-36594-2_22zbMath1315.94088OpenAlexW2155720185MaRDI QIDQ4910289

Steve Lu, Rafail Ostrovsky

Publication date: 18 March 2013

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-36594-2_22




Related Items (25)

SQL on structurally-encrypted databasesParameter-hiding order revealing encryptionA logarithmic lower bound for oblivious RAM (for all Parameters)Oblivious RAM with \textit{worst-case} logarithmic overheadLarge-Scale Secure Computation: Multi-party Computation for (Parallel) RAM ProgramsA Secure Priority Queue; Or: On Secure Datastructures from Multiparty ComputationCNF-FSS and Its Applications3-party distributed ORAM from oblivious set membershipLower bound framework for differentially private and oblivious data structuresLinear-time 2-party secure merge from additively homomorphic encryptionRandom-index oblivious RAM\textsf{MacORAMa}: optimal oblivious RAM with integrityOblivious RAM with worst-case logarithmic overheadSimple and efficient two-server ORAMMore is less: perfectly secure oblivious algorithms in the multi-server settingAsymptotically Tight Bounds for Composing ORAM with PIRSublinear Zero-Knowledge Arguments for RAM ProgramsIs there an oblivious RAM lower bound for online reads?Is there an oblivious RAM lower bound for online reads?Oblivious Parallel RAM and ApplicationsAlibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solutionTwo-server distributed ORAM with sublinear computation and constant roundsTWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable EncryptionOblivious network RAM and leveraging parallelism to achieve obliviousnessOptORAMa: optimal oblivious RAM




This page was built for publication: Distributed Oblivious RAM for Secure Two-Party Computation