A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Oblivm: A programming framework for secure computation
We design and develop ObliVM, a programming framework for secure computation. ObliVM
offers a domain specific language designed for compilation of programs into efficient …
offers a domain specific language designed for compilation of programs into efficient …
Oblix: An efficient oblivious search index
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …
in running them on encrypted data. Unfortunately, many known schemes that enable search …
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
Scaling ORAM for secure computation
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …
structure that is optimized for use in two-party secure computation protocols. We improve …
Obliv-C: A language for extensible data-oblivious computation
Many techniques for secure or private execution depend on executing programs in a data-
oblivious way, where the same instructions execute independent of the private inputs which …
oblivious way, where the same instructions execute independent of the private inputs which …
OptORAMa: optimal oblivious RAM
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …
Onion ORAM: A constant bandwidth blowup oblivious RAM
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …
A Survey on Searchable Symmetric Encryption
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …
The fallacy of composition of oblivious ram and searchable encryption
M Naveed - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has
been a lot of progress in the efficiency of ORAM schemes; however, less attention has been …
been a lot of progress in the efficiency of ORAM schemes; however, less attention has been …