Search
Search Results
-
Oblivious Outsourced Storage with Delegation
In the past few years, outsourcing private data to untrusted servers has become an important challenge. This raises severe questions concerning the... -
Distributed Shuffling for Preserving Access Confidentiality
The shuffle index has been recently proposed for organizing and accessing data in outsourcing scenarios while protecting the confidentiality of the... -
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
This work presents the design and analysis of the first searchable symmetric encryption (SSE) protocol that supports conjunctive search and general... -
Parallel and Dynamic Searchable Symmetric Encryption
Searchable symmetric encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to... -
Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access
In this paper we are interested in privacy preserving discretionary access control (DAC) for outsourced storage such as increasingly popular cloud... -
Perfectly Secure Oblivious RAM without Random Oracles
We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information theoretic sense,... -
Oblivious RAM with O((logN)3) Worst-Case Cost
Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing... -
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are... -
Regulatory Compliant Oblivious RAM
We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM)... -
-
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
Cloud computing is a new computing paradigm that is gaining increased popularity. More and more sensitive user data are stored in the cloud. The... -
A new hardware-assisted PIR with O(n) shuffle cost
Since the concept of private information retrieval (PIR) was first formalized by Chor et al., various constructions have been proposed with a common...
-
Secure Cryptographic Precomputation with Insecure Memory
We propose a solution that provides secure storage for cryptographic precomputation using insecure memory that is susceptible to eavesdrop** and... -
Private Information Retrieval Using Trusted Hardware
Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure,... -
Application Case Studies
Chapter 1 through Chapter 8 have toured the evolution of an armored, general-purpose secure coprocessor as a trusted computing platform. This chapter... -
-
Private Information Storage with Logarithmic-Space Secure Hardware
In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested. Recent... -
Parallel machines and their communication theoretical limits
We have tried to structure a variety of papers on communication in parallel systems. How much information exchange is necessary for fast computations...