Searchable encryption for healthcare clouds: A survey
R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …
popular trend for many medical practices, because using healthcare cloud services can help …
Oblivious {Multi-Party} machine learning on trusted processors
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …
collaborative data analytics while guaranteeing the privacy of their individual datasets …
Practical dynamic searchable encryption with small leakage
Abstract Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his
document collection in a way that it is still searchable and efficiently updatable. However, all …
document collection in a way that it is still searchable and efficiently updatable. However, all …
Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
Oblivm: A programming framework for secure computation
We design and develop ObliVM, a programming framework for secure computation. ObliVM
offers a domain specific language designed for compilation of programs into efficient …
offers a domain specific language designed for compilation of programs into efficient …
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
Preventing page faults from telling your secrets
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
Oblivious RAM with O((logN)3) Worst-Case Cost
Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from
an untrusted server in storage outsourcing applications. Until recently, most prior works on …
an untrusted server in storage outsourcing applications. Until recently, most prior works on …
Scaling ORAM for secure computation
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …
structure that is optimized for use in two-party secure computation protocols. We improve …
Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …