A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Oblivm: A programming framework for secure computation

C Liu, XS Wang, K Nayak, Y Huang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
We design and develop ObliVM, a programming framework for secure computation. ObliVM
offers a domain specific language designed for compilation of programs into efficient …

Oblix: An efficient oblivious search index

P Mishra, R Poddar, J Chen, A Chiesa… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …

Circuit oram: On tightness of the goldreich-ostrovsky lower bound

X Wang, H Chan, E Shi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …

Scaling ORAM for secure computation

J Doerner, A Shelat - Proceedings of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …

Obliv-C: A language for extensible data-oblivious computation

S Zahur, D Evans - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Many techniques for secure or private execution depend on executing programs in a data-
oblivious way, where the same instructions execute independent of the private inputs which …

OptORAMa: optimal oblivious RAM

G Asharov, I Komargodski, WK Lin, K Nayak… - Advances in Cryptology …, 2020 - Springer
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and
Ostrovsky (STOC'87 and J. ACM'96) is a technique for provably obfuscating programs' …

Onion ORAM: A constant bandwidth blowup oblivious RAM

S Devadas, M van Dijk, CW Fletcher, L Ren… - Theory of Cryptography …, 2016 - Springer
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …

A Survey on Searchable Symmetric Encryption

F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng - ACM Computing Surveys, 2023 - dl.acm.org
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …

The fallacy of composition of oblivious ram and searchable encryption

M Naveed - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has
been a lot of progress in the efficiency of ORAM schemes; however, less attention has been …