Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms 2012
DOI: 10.1137/1.9781611973099.13
|View full text |Cite
|
Sign up to set email alerts
|

On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
220
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 174 publications
(220 citation statements)
references
References 16 publications
0
220
0
Order By: Relevance
“…[3][4][5][6][7][8][9][10]12,14]. These ORAMs only have little state information, such as secret keys and query counters, stored in local storage.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[3][4][5][6][7][8][9][10]12,14]. These ORAMs only have little state information, such as secret keys and query counters, stored in local storage.…”
Section: Related Workmentioning
confidence: 99%
“…These ORAMs only have little state information, such as secret keys and query counters, stored in local storage. Among them, Balanced ORAM (B-ORAM) [9] proposed by Kushilevitz et. al.…”
Section: Related Workmentioning
confidence: 99%
“…Oblivious RAM (ORAM) was first proposed by Goldreich and Ostrovsky [21], and later improved in a series of works [13,14,17,20,[22][23][24]26,[28][29][30][31][33][34][35][36][37]. Recently, ORAM has been used in outsourcing storage [22,35,37], and in secure two-party computation to achieve sublinear amortized cost [17,25].…”
Section: Related Workmentioning
confidence: 99%
“…In Section 4, we give two specific VOS schemes -Path VOS and Hierarchical VOS. These are derived from the two classes of ORAM schemes, the hierarchical construction [21] and its variants [22,24,26,30,[35][36][37], and the binary-tree scheme [31] and its variants [13,17,34].…”
Section: Oram To Vos: Generic Compilation Techniquesmentioning
confidence: 99%
See 1 more Smart Citation