On the (in)security of hash-based oblivious RAM and a new balancing scheme
From MaRDI portal
Publication:5743385
Recommendations
Cites work
- scientific article; zbMATH DE number 1875412 (Why is no real title available?)
- De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results
- More Robust Hashing: Cuckoo Hashing with a Stash
- Oblivious RAM Revisited
- Oblivious RAM with \(O((\log N)^{3})\) worst-case cost
- Oblivious RAMs without cryptogarphic assumptions
- Perfectly secure oblivious RAM without random oracles
- Privacy-preserving access of outsourced data via oblivious RAM simulation
- Public Key Encryption That Allows PIR Queries
- Public-Key Encryption with Efficient Amortized Updates
- Relations Among Complexity Measures
- Software protection and simulation on oblivious RAMs
- Space/time trade-offs in hash coding with allowable errors
Cited in
(38)- Stronger lower bounds for online ORAM
- Oblivious network RAM and leveraging parallelism to achieve obliviousness
- Succinct oblivious RAM
- OptORAMa: optimal oblivious RAM
- 3-party distributed ORAM from oblivious set membership
- Lower bound framework for differentially private and oblivious data structures
- Is there an oblivious RAM lower bound for online reads?
- Locality-preserving oblivious RAM
- OptORAMa: Optimal oblivious RAM
- Cuckoo hashing in cryptography: optimal parameters, robustness and applications
- Oblivious RAM with \(O((\log N)^{3})\) worst-case cost
- Constant-round maliciously secure two-party computation in the RAM model
- DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
- Privacy-preserving group data access via stateless oblivious RAM simulation
- Perfectly secure oblivious parallel RAM
- Random-index oblivious RAM
- Parameter-hiding order revealing encryption
- SQL on structurally-encrypted databases
- Simple and efficient two-server ORAM
- Verifiable oblivious storage
- Provably-secure remote memory attestation for heap overflow protection
- A logarithmic lower bound for oblivious RAM (for all Parameters)
- Oblivious RAM with \textit{worst-case} logarithmic overhead
- Is there an oblivious RAM lower bound for online reads?
- Snapshot-oblivious RAMs: sub-logarithmic efficiency for short transcripts
- Oblivious hashing revisited, and applications to asymptotically efficient ORAM and OPRAM
- Multi-client Oblivious RAM Secure Against Malicious Servers
- \textsf{MacORAMa}: optimal oblivious RAM with integrity
- Limits of breach-resistant and snapshot-oblivious RAMs
- Anonymous RAM
- Alibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solution
- Locality-preserving oblivious RAM
- Structured encryption and dynamic leakage suppression
- More is less: perfectly secure oblivious algorithms in the multi-server setting
- The complexity of secure RAMs
- A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
- Oblivious RAM with worst-case logarithmic overhead
- Privacy-preserving access of outsourced data via oblivious RAM simulation
This page was built for publication: On the (in)security of hash-based oblivious RAM and a new balancing scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5743385)