Filters








110 Hits in 6.0 sec

Combining ORAM with PIR to Minimize Bandwidth Costs

Jonathan Dautrich, Chinya Ravishankar
<span title="">2015</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5k5czdpiarc6bggykp6ymn4t4e" style="color: black;">Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY &#39;15</a> </i> &nbsp;
Oblivious RAM (ORAM) protocols guarantee full access pattern privacy, but even the most efficient ORAMs proposed to date incur large bandwidth costs.  ...  Even if the stored data are encrypted, access patterns may leak valuable information.  ...  ACKNOWLEDGEMENTS This work was completed while the first author was a student at UC Riverside, and was supported by the National Physical Science Consortium Graduate Fellowship and by grant N00014-07-C  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2699026.2699117">doi:10.1145/2699026.2699117</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/codaspy/DautrichR15.html">dblp:conf/codaspy/DautrichR15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s77xbzhflrfnfdw2wkwzzvk7xy">fatcat:s77xbzhflrfnfdw2wkwzzvk7xy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151026141724/http://www.cs.ucr.edu/~ravi/Papers/DBConf/p289-dautrich.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/32/30/32306b97c9ea92968952911e79c0e01db6069b8a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2699026.2699117"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation

Yuto NAKANO, Shinsaku KIYOMOTO, Yutaka MIYAKE, Kouichi SAKURAI
<span title="">2014</span> <i title="Institute of Electronics, Information and Communications Engineers (IEICE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xosmgvetnbf4zpplikelekmdqe" style="color: black;">IEICE transactions on information and systems</a> </i> &nbsp;
Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software  ...  We also address implementing issues of ORAM and propose practical solutions for these issues. key words: access pattern protection, oblivious RAM, private information retrieval received his B.E. in engineering  ...  Acknowledgement The last author is partially supported by JSPS-Kaken No.23300027.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transinf.2013thp0007">doi:10.1587/transinf.2013thp0007</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vxeizxt3hbh5ramjtqognrphqm">fatcat:vxeizxt3hbh5ramjtqognrphqm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030113828/https://www.jstage.jst.go.jp/article/transinf/E97.D/10/E97.D_2013THP0007/_pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/98/f4987c465a345e10beab8f14e75842b95f9f1f65.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transinf.2013thp0007"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Tunably-Oblivious Memory

Jonathan Dautrich, Chinya Ravishankar
<span title="">2015</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5k5czdpiarc6bggykp6ymn4t4e" style="color: black;">Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY &#39;15</a> </i> &nbsp;
Oblivious RAM (ORAM) protocols guarantee full access pattern privacy, but even the most efficient ORAMs to date require roughly ℓ log 2 N block transfers to satisfy an ℓ-block query, for block store capacity  ...  We consider the challenge of providing privacy-preserving access to data outsourced to an untrusted cloud provider. Even if data blocks are encrypted, access patterns may leak valuable information.  ...  The work was supported in part by the National Physical Science Consortium Graduate Fellowship and by grant N00014-07-C-0311 from the Office of Naval Research.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2699026.2699097">doi:10.1145/2699026.2699097</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/codaspy/DautrichR15a.html">dblp:conf/codaspy/DautrichR15a</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zoi5xcrpcvaupcposbg5s6vghy">fatcat:zoi5xcrpcvaupcposbg5s6vghy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151026141808/http://www.cs.ucr.edu/~ravi/Papers/DBConf/p313-dautrich.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6b/f2/6bf2c022fcacf2f80c6ea3f44dcc4e4e1331abc4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2699026.2699097"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Outsourced private information retrieval

Yizhou Huang, Ian Goldberg
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gstzkitjpfagfei6fz6yhj4apu" style="color: black;">Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society - WPES &#39;13</a> </i> &nbsp;
Our system is compatible with existing PIR access control and pricing schemes on a per-record basis for these reads.  ...  We observe that by layering PIR on top of an Oblivious RAM (ORAM) data layout, we provide the ability for the database owner to perform private writes, while database clients can perform private reads  ...  Symmetric PIR and Oblivious Transfer Symmetric PIR (SPIR) protects the privacy of the database server by making sure that the database client learns only one record per access request.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2517840.2517854">doi:10.1145/2517840.2517854</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wpes/HuangG13.html">dblp:conf/wpes/HuangG13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4733eodivferfder4tdjmfpxmm">fatcat:4733eodivferfder4tdjmfpxmm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150907234749/http://www.cypherpunks.ca/~iang/pubs/opir-wpes.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a2/0b/a20b8752674f77a5ed26aeb3c9d4618b782b5370.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2517840.2517854"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Oblivious Outsourced Storage with Delegation [chapter]

Martin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotakova
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This raises severe questions concerning the security and privacy of the data on the external storage.  ...  Our solution is as efficient as the underlying ORAM constructs and allows for delegated read or write access while ensuring strong guarantees for the privacy of the outsourced data.  ...  Sion and Sotakova were supported by NSF through awards 0937833, 0845192, and 0803197, as well as by CA Technologies, Xerox, IBM and Microsoft Research.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27576-0_11">doi:10.1007/978-3-642-27576-0_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gwijhkl4ibh2vnsgau337c2pwi">fatcat:gwijhkl4ibh2vnsgau337c2pwi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809192601/https://zxr.io/research/sion2011fc-oram.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/88/c188ee078abd1e9807b9c5bcee129f053f489bd8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27576-0_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Database Access Pattern Protection Without Full-Shuffles

Xuhua Ding, Yanjiang Yang, Robert H. Deng
<span title="">2011</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xqa4uhvxwvgsbdpllabnuanz6e" style="color: black;">IEEE Transactions on Information Forensics and Security</a> </i> &nbsp;
Recent works in [9], [10], [19] propose to protect access patterns by introducing a trusted component with constant storage size. The resulting privacy assurance is as strong as PIR.  ...  Privacy protection is one of the fundamental security requirements for database outsourcing. A major threat is information leakage from database access patterns generated by query executions.  ...  ACKNOWLEDGEMENT This research is partly supported by the Office of Research, Singapore Management University. We would like to thank the anonymous reviewers for their valuable comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2010.2101062">doi:10.1109/tifs.2010.2101062</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a7m4pmgvybe4pdgmzg75yw3zqi">fatcat:a7m4pmgvybe4pdgmzg75yw3zqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721140547/http://www.mysmu.edu/faculty/xhding/publications/jpir-tifs.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/89/7b8922538aefeed4fa7d55f757b0f9cadad7a2cd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2010.2101062"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Practical Oblivious Outsourced Storage

Peter Williams, Radu Sion, Miroslava Sotakova
<span title="2011-09-01">2011</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/trn6le535rfr5ma6j7pf3fegae" style="color: black;">ACM Transactions on Privacy and Security</a> </i> &nbsp;
This results in a protocol crossing the boundary between theory and practice and becoming generally applicable for access pattern privacy.  ...  In this paper we introduce a technique, guaranteeing access pattern privacy against a computationally bounded adversary, in outsourced data storage, with communication and computation overheads orders  ...  run the access pattern privacy algorithm, is employed by all the following PIR schemes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2019599.2019605">doi:10.1145/2019599.2019605</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ilol7xrtirgqvg5jvh27eb2oka">fatcat:ilol7xrtirgqvg5jvh27eb2oka</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809192706/https://zxr.io/research/sion2011pir-tissec.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4e/34/4e341b6f6a7707f85ec88bfe1b29b4395b21088d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2019599.2019605"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
<span title="2016-06-06">2016</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  However, under open networks and not fully trusted cloud environments, they face enormous security and privacy risks (e.g., data leakage or disclosure, data corruption or loss, and user privacy breach)  ...  To achieve access pattern privacy, three typical protection approaches are proposed: Private Information Retrieval (PIR) [Chor et al. 1998 ], Oblivious RAM (ORAM) [Ding et al. 2011] , and dynamically  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2906153">doi:10.1145/2906153</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/c57iz6lswvfxbmhireksha35vm">fatcat:c57iz6lswvfxbmhireksha35vm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706171303/http://cloudbus.org/papers/Security-PrivacyPerservation2016.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/8c/528c068c8a28229ed37fbba555dca55283b3ca26.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2906153"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Sub-logarithmic Distributed Oblivious RAM with Small Block Size [article]

Eyal Kushilevitz, Tamer Mour
<span title="2018-11-17">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
By plugging efficient known hashing schemes in our constructions, we get the following results: 1. For any m≥ 2, we show an m-server ORAM scheme with O( N/ N) overhead, and block size Ω(^2 N).  ...  Distributed Oblivious RAM is a variant of ORAM, where the data is stored in m>1 servers.  ...  We refer to the access pattern of the RAM machine that is simulated as the virtual access pattern. The access pattern that is produced by the oblivious simulation is called the actual access pattern.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1802.05145v3">arXiv:1802.05145v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o45iuuoegjgrzaiic63rmcrw3y">fatcat:o45iuuoegjgrzaiic63rmcrw3y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191020090054/https://arxiv.org/pdf/1802.05145v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/aa/a6/aaa6a69e248423685ab8476e756fa8037b222a05.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1802.05145v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Oblivious RAM

Zhao Chang, Dong Xie, Feifei Li
<span title="2016-08-01">2016</span> <i title="VLDB Endowment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/p6rqwwpkkjbcldejepcehaalby" style="color: black;">Proceedings of the VLDB Endowment</a> </i> &nbsp;
To that end, one can hide the access patterns, which may leak sensitive information, using Oblivious RAMs (ORAMs).  ...  Despite the use of strong encryption schemes, adversaries can still learn valuable information regarding encrypted data by observing the data access patterns.  ...  One can completely seal a client's access patterns from the cloud by using Oblivious RAMs (ORAMs). ORAM is originally proposed by Goldreich [13] and Ostrovsky [26] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14778/2994509.2994528">doi:10.14778/2994509.2994528</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m6szxgakmjh3jhprvqg2fel4dq">fatcat:m6szxgakmjh3jhprvqg2fel4dq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160824065547/http://www.cs.utah.edu:80/~zchang/oram-vldb16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a2/5c/a25cb98c29ba3ce84ff8afd362a3c71e86208669.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14778/2994509.2994528"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

PrivateFS

Peter Williams, Radu Sion, Alin Tomescu
<span title="">2012</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2012 ACM conference on Computer and communications security - CCS &#39;12</a> </i> &nbsp;
Privatefs is an oblivious file system that enables access to remote storage, while keeping both the file contents and client access patterns secret.  ...  privacy leaks.  ...  RELATED WORK Oblivious RAM, introduced by Goldreich and Ostrovsky [2] is a primitive that provides access pattern privacy to a single client (or software process) accessing a remote database (or RAM)  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2382196.2382299">doi:10.1145/2382196.2382299</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/WilliamsST12.html">dblp:conf/ccs/WilliamsST12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zlz2cnu4hjazba4lkq5blkh2te">fatcat:zlz2cnu4hjazba4lkq5blkh2te</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809122504/https://zxr.io/research/sion2012privatefs-ccs.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/d6/0ed6417bda30f909210a4bc65a7e100cc6dc7c8d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2382196.2382299"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Maliciously Secure Multi-Client ORAM [chapter]

Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
All these works, however, either do not consider malicious clients or they significantly constrain the definition of obliviousness and the system's practicality.  ...  The goal of this cryptographic primitive is to conceal not only the data but also the access patterns from the server.  ...  Finally, it guarantees the obliviousness of access patterns with respect to the server as well as malicious clients, excluding however the accesses on data readable by the adversary.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-61204-1_32">doi:10.1007/978-3-319-61204-1_32</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hlav2s5wtjditpmcojqw6lmp4y">fatcat:hlav2s5wtjditpmcojqw6lmp4y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710050532/http://eprint.iacr.org/2017/329.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/9a/a79a832026daf1d19e519bd065b69177e09eed00.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-61204-1_32"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Constant Communication ORAM with Small Blocksize

Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
<span title="">2015</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS &#39;15</a> </i> &nbsp;
This generally involves shuffling and reencrypting the data somehow each time it is read or written to in order to unlink two accesses to the same block.  ...  There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols.  ...  Acknowledgements: We thank shepherds Chris Fletcher, Ling Ren, and Elaine Shi for valuable discussions improving the paper. This work was partially supported by NSF grant 1218197.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2810103.2813701">doi:10.1145/2810103.2813701</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/MoatazMB15.html">dblp:conf/ccs/MoatazMB15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qgcy6awkffggpeeoje4zjb23tq">fatcat:qgcy6awkffggpeeoje4zjb23tq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160616153516/https://eprint.iacr.org/2015/570.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/6d/1e6dda18549f74155ca3bc6d144f439108aa5474.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2810103.2813701"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Nearest neighbor search with strong location privacy

Stavros Papadopoulos, Spiridon Bakiras, Dimitris Papadias
<span title="2010-09-01">2010</span> <i title="VLDB Endowment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/p6rqwwpkkjbcldejepcehaalby" style="color: black;">Proceedings of the VLDB Endowment</a> </i> &nbsp;
The former ensures that the LBS is oblivious of each block retrieved by the algorithms.  ...  Specifically, we employ secure hardware-aided PIR, which has been proven very efficient and is currently considered as a practical mechanism for PIR.  ...  Secure hardware PIR is currently the only practical PIR mechanism. It relies on a tamper-resistant CPU that is positioned at the server and is trusted by the clients.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14778/1920841.1920920">doi:10.14778/1920841.1920920</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5sq5fqiuizf3fhfg6a4mvivgnm">fatcat:5sq5fqiuizf3fhfg6a4mvivgnm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922031216/http://www.comp.nus.edu.sg/%7Evldb2010/proceedings/files/papers/R55.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/be/1abe15803cb204f640e113d976eb273329c80957.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14778/1920841.1920920"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Asymptotically Tight Bounds for Composing ORAM with PIR [chapter]

Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren
<span title="">2017</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Private information retrieval (PIR) and Oblivious RAM (ORAM) are two closely related concepts, and they both hide access patterns.  ...  Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted client to outsource storage to an untrusted server while hiding the client's memory access patterns to the server.  ...  This work is funded in part by NSF awards #1111599, #1563722 and a Google Ph.D. Fellowship award.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-54365-8_5">doi:10.1007/978-3-662-54365-8_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/adzojsnhwnan3dlwu57zdyxzoq">fatcat:adzojsnhwnan3dlwu57zdyxzoq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710230355/http://eprint.iacr.org/2016/849.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/8f/a98f1d700c715c5f5d405409eb5c28dfd806040c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-54365-8_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 110 results