Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
OnionPIR: Response efficient single-server PIR
This paper presents OnionPIR and stateful OnionPIR, two single-server PIR schemes that
significantly improve the response size and computation cost over state-of-the-art schemes …
significantly improve the response size and computation cost over state-of-the-art schemes …
Scaling ORAM for secure computation
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …
structure that is optimized for use in two-party secure computation protocols. We improve …
Oblidb: Oblivious query processing for secure databases
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …
of databases outsourced to the cloud. These enclaves provide an execution environment …
Graphsc: Parallel secure computation made easy
We propose introducing modern parallel programming paradigms to secure computation,
enabling their secure execution on large datasets. To address this challenge, we present …
enabling their secure execution on large datasets. To address this challenge, we present …
Yes, there is an oblivious RAM lower bound!
Abstract An Oblivious RAM (ORAM) introduced by Goldreich and Ostrovsky JACM'96 is a
(possibly randomized) RAM, for which the memory access pattern reveals no information …
(possibly randomized) RAM, for which the memory access pattern reveals no information …
Snoopy: Surpassing the scalability bottleneck of oblivious storage
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …
not scale to sustain high throughput as they rely on a central point of coordination. To …
PanORAMa: Oblivious RAM with logarithmic overhead
We present PanORAMa, the first Oblivious RAM construction that achieves communication
overhead O (log N log log N) for database of N blocks and for any block size B= Ω (log N) …
overhead O (log N log log N) for database of N blocks and for any block size B= Ω (log N) …
Taostore: Overcoming asynchronicity in oblivious data storage
We consider oblivious storage systems hiding both the contents of the data as well as
access patterns from an untrusted cloud provider. We target a scenario where multiple users …
access patterns from an untrusted cloud provider. We target a scenario where multiple users …
Cloud computing security: foundations and research directions
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …
computation come with security and privacy concerns. This monograph explores the …