Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
Reverse engineering convolutional neural networks through side-channel information leaks
A convolutional neural network (CNN) model represents a crucial piece of intellectual
property in many applications. Revealing its structure or weights would leak confidential …
property in many applications. Revealing its structure or weights would leak confidential …
Oblix: An efficient oblivious search index
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …
in running them on encrypted data. Unfortunately, many known schemes that enable search …
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …
Constants count: Practical improvements to oblivious {RAM}
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as
seen by untrusted storage. This paper proposes Ring ORAM, the most bandwidth-efficient …
seen by untrusted storage. This paper proposes Ring ORAM, the most bandwidth-efficient …
Ghostrider: A hardware-software system for memory trace oblivious computation
This paper presents a new, co-designed compiler and architecture called GhostRider for
supporting privacy preserving computation in the cloud. GhostRider ensures all programs …
supporting privacy preserving computation in the cloud. GhostRider ensures all programs …
Onion ORAM: A constant bandwidth blowup oblivious RAM
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …
{DORY}: An encrypted search system with distributed trust
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
Formal abstractions for attested execution secure processors
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
commonly realize an “attested execution” abstraction. Despite being the de facto standard …