Verifiable oblivious storage
From MaRDI portal
Recommendations
Cited in
(16)- 3-party distributed ORAM from oblivious set membership
- Is there an oblivious RAM lower bound for online reads?
- New unbounded verifiable data streaming for batch query with almost optimal overhead
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
- SQL on structurally-encrypted databases
- Simple and efficient two-server ORAM
- Asymptotically tight bounds for composing ORAM with PIR
- Is there an oblivious RAM lower bound for online reads?
- \textsf{MacORAMa}: optimal oblivious RAM with integrity
- Locality-preserving oblivious RAM
- Maliciously secure multi-client ORAM
- Disappearing cryptography in the bounded storage model
- Dynamic proofs of retrievability via oblivious RAM
- Dynamic proofs of retrievability via oblivious RAM
- STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement
This page was built for publication: Verifiable oblivious storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402968)