\textsf{MacORAMa}: optimal oblivious RAM with integrity
From MaRDI portal
Publication:6190099
DOI10.1007/978-3-031-38551-3_4MaRDI QIDQ6190099FDOQ6190099
Authors: Surya Mathialagan, Neekon Vafa
Publication date: 6 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Recommendations
Cites Work
- How Efficient Can Memory Checking Be?
- Checking the correctness of memories
- Cuckoo hashing
- Sorting in \(c \log n\) parallel steps
- Title not available (Why is that?)
- Software protection and simulation on oblivious RAMs
- Privacy-preserving access of outsourced data via oblivious RAM simulation
- Oblivious RAM with \(O((\log N)^{3})\) worst-case cost
- Path ORAM
- The complexity of online memory checking
- Perfectly secure oblivious parallel RAM
- On the depth of oblivious parallel RAM
- Oblivious hashing revisited, and applications to asymptotically efficient ORAM and OPRAM
- Perfectly secure oblivious RAM without random oracles
- On the (in)security of hash-based oblivious RAM and a new balancing scheme
- Distributed Oblivious RAM for Secure Two-Party Computation
- Verifiable oblivious storage
- Asymptotically tight bounds for composing ORAM with PIR
- OptORAMa: optimal oblivious RAM
- Yes, there is an oblivious RAM lower bound!
- Compact proofs of retrievability
- Private database access with HE-over-ORAM architecture
- Multi-client oblivious RAM with poly-logarithmic communication
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- A logarithmic lower bound for oblivious RAM (for all Parameters)
- Oblivious RAM with worst-case logarithmic overhead
- Maliciously secure multi-client ORAM
- Multi-client Oblivious RAM Secure Against Malicious Servers
- Parallelizable Authentication Trees
Cited In (1)
This page was built for publication: \textsf{MacORAMa}: optimal oblivious RAM with integrity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6190099)