Searchable encryption for healthcare clouds: A survey

R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …

Oblivious {Multi-Party} machine learning on trusted processors

O Ohrimenko, F Schuster, C Fournet, A Mehta… - 25th USENIX Security …, 2016 - usenix.org
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …

Practical dynamic searchable encryption with small leakage

E Stefanov, C Papamanthou, E Shi - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Abstract Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his
document collection in a way that it is still searchable and efficiently updatable. However, all …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Oblivm: A programming framework for secure computation

C Liu, XS Wang, K Nayak, Y Huang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
We design and develop ObliVM, a programming framework for secure computation. ObliVM
offers a domain specific language designed for compilation of programs into efficient …

Circuit oram: On tightness of the goldreich-ostrovsky lower bound

X Wang, H Chan, E Shi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …

Preventing page faults from telling your secrets

S Shinde, ZL Chua, V Narayanan… - … of the 11th ACM on Asia …, 2016 - dl.acm.org
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …

Oblivious RAM with O((logN)3) Worst-Case Cost

E Shi, THH Chan, E Stefanov, M Li - … on The Theory and Application of …, 2011 - Springer
Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from
an untrusted server in storage outsourcing applications. Until recently, most prior works on …

Scaling ORAM for secure computation

J Doerner, A Shelat - Proceedings of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …