Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation - MaRDI portal

Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation

From MaRDI portal
Publication:3012949

DOI10.1007/978-3-642-22012-8_46zbMath1333.68100arXiv1007.1259OpenAlexW1704895987MaRDI QIDQ3012949

Michael Mitzenmacher, Michael T. Goodrich

Publication date: 7 July 2011

Published in: Automata, Languages and Programming (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1007.1259




Related Items (30)

SSE and SSD: page-efficient searchable symmetric encryptionPerfectly secure oblivious parallel RAMSQL on structurally-encrypted databasesParameter-hiding order revealing encryptionA logarithmic lower bound for oblivious RAM (for all Parameters)Oblivious RAM with \textit{worst-case} logarithmic overheadUnnamed ItemPrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesStronger lower bounds for online ORAMData-Oblivious Graph Algorithms in Outsourced External MemorySnapshot-oblivious RAMs: sub-logarithmic efficiency for short transcriptsCuckoo hashing in cryptography: optimal parameters, robustness and applications\textsf{MacORAMa}: optimal oblivious RAM with integrityMulti-user image retrieval with suppression of search pattern leakageOblivious RAM with worst-case logarithmic overheadForward secret encrypted RAM: lower bounds and applicationsSimple and efficient two-server ORAMMore is less: perfectly secure oblivious algorithms in the multi-server settingExplicit and efficient hash families suffice for cuckoo hashing with a stashDynamic proofs of retrievability via oblivious RAMAsymptotically Tight Bounds for Composing ORAM with PIROblivious Parallel RAM and ApplicationsOblivious Parallel RAM: Improved Efficiency and Generic ConstructionsLocality-preserving oblivious RAMAlibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solutionTWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable EncryptionOblivious network RAM and leveraging parallelism to achieve obliviousnessUnnamed ItemUnnamed ItemOptORAMa: optimal oblivious RAM


Uses Software


Cites Work


This page was built for publication: Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation