搜索结果: 1-15 共查到“军队指挥学 ORAM”相关记录33条 . 查询时间(0.031 秒)
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Homomorphic Encryption Oblivious RAM
2019/6/24
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to hide access pattern to its data encrypted and stored at a remote server. Traditionally, ORAM algorithms assume the server acts...
Distributed Oblivious RAM (DORAM) protocols---in which parties obliviously access a shared location in a shared array---are a fundamental component of secure-computation protocols in the RAM model. We...
Oblivious RAM protocols (ORAMs) allow a client to access data from an untrusted storage device without revealing to that device any information about their access pattern. Typically this is accomplish...
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
secure computation multi-party computation (MPC) oblivious RAM (ORAM)
2018/4/17
Multi-Party Computation of Oblivious RAM (MPC ORAM) implements secret-shared random access memory in a way that protects access pattern privacy against a threshold of corruptions. MPC ORAM enables sec...
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Secure Enclaves Intel SGX Oblivious Data Structures
2018/3/8
Ability to query and update over encrypted data is an essential feature to enable breach-resilient cyber-infrastructures. Statistical attacks on searchable encryption (SE) have demonstrated the import...
Oblivious RAM is a well-known cryptographic primitive to hide data access patterns. However, the best known ORAM schemes require a logarithmic computation time in the general case which makes it infea...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the best prior work. Our construction combines any tree-based ORAM with an extension of a two-server priv...
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM
Privacy Enhancing Technologies Searchable Encryption Oblivious Random Access Machine (ORAM)
2017/11/30
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate search/update operations over encrypted data via an encrypted index. However, DSSE is known to be vulnerable against statistical infer...
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM
Oblivious RAM Oblivious PRAM
2017/9/25
Oblivious RAM (ORAM) is a powerful cryptographic building block that allows a program to provably hide its access patterns to sensitive data. Since the original proposal of ORAM by Goldreich and Ostro...
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
ORAM privacy-enhancing technologies secret sharing
2017/9/1
Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her access patterns. Existing client-efficient ORAMs either achieve O(log N) client-server communication blow...
Scaling ORAM for Secure Computation
Oblivious RAM Private Information Retrieval Secure Multi-Party Computation
2017/9/1
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is optimized for use in two-party secure computation protocols. We improve upon the access time of previ...
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents of data and also hiding the pattern of write operations over that data. WoORAMs provide better privacy than plain...
Constant bandwidth ORAM with small block size using PIR operations
ORAM constant communication overhead oblivious clear algorithm
2017/6/22
Recently, server-with-computation model has been applied in Oblivious RAM scheme to achieve constant communication (constant number of blocks). However, existing works either result in large block siz...
Oblivious RAM (ORAM) has emerged as an enabling technology to secure cloud-based storage services. The goal of this cryptographic primitive is to conceal not only the data but also the access patterns...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted client to outsource storage to an untrusted server while hiding the client's memory access patterns to the server. The last thre...