Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Oblivious RAM with O((logN)3) Worst-Case Cost - MaRDI portal

Oblivious RAM with O((logN)3) Worst-Case Cost

From MaRDI portal
Publication:3102186

DOI10.1007/978-3-642-25385-0_11zbMath1227.68025OpenAlexW1545698365MaRDI QIDQ3102186

Mingfei Li, Elaine Shi, T.-H. Hubert Chan, Emil Stefanov

Publication date: 2 December 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_11




Related Items (39)

Perfectly secure oblivious parallel RAMSQL on structurally-encrypted databasesParameter-hiding order revealing encryptionA logarithmic lower bound for oblivious RAM (for all Parameters)Oblivious RAM with \textit{worst-case} logarithmic overheadPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeUnnamed ItemConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsA theory of composition for differential obliviousnessM-ORAM Revisited: Security and Construction UpdatesSnapshot-oblivious RAMs: sub-logarithmic efficiency for short transcripts3-party distributed ORAM from oblivious set membershipNanoGRAM: garbled RAM with \(\widetilde{O}(\log N)\) overhead\textsf{MacORAMa}: optimal oblivious RAM with integrityMulti-user image retrieval with suppression of search pattern leakageOblivious RAM with worst-case logarithmic overheadSimple and efficient two-server ORAMMore is less: perfectly secure oblivious algorithms in the multi-server setting3D Visibility Representations of 1-planar GraphsImproved building blocks for secure multi-party computation based on secret sharing with honest majorityDynamic proofs of retrievability via oblivious RAMAsymptotically Tight Bounds for Composing ORAM with PIRConstant-round maliciously secure two-party computation in the RAM modelIs there an oblivious RAM lower bound for online reads?Is there an oblivious RAM lower bound for online reads?Private Database Access with HE-over-ORAM ArchitectureOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMOblivious Parallel RAM and ApplicationsOblivious Parallel RAM: Improved Efficiency and Generic ConstructionsPrivacy-Preserving k-Nearest Neighbour Query on Outsourced DatabaseLocality-preserving oblivious RAMAlibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solutionStructured encryption and dynamic leakage suppressionTWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable EncryptionOblivious network RAM and leveraging parallelism to achieve obliviousnessUnnamed ItemUnnamed ItemOptORAMa: optimal oblivious RAM




This page was built for publication: Oblivious RAM with O((logN)3) Worst-Case Cost