Statistically-secure ORAM with O(log^2 n) Overhead (English)
- New search for: Chung, K.-M.
- New search for: Liu, Z.
- New search for: Pass, R.
- New search for: Chung, K.-M.
- New search for: Liu, Z.
- New search for: Pass, R.
- New search for: Sarkar, Palash
- New search for: Iwata, Tetsu
In:
Theory and application of cryptology and information security; Advances in cryptology - ASIACRYPT 2014
8874
;
62-81
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Statistically-secure ORAM with O(log^2 n) Overhead
-
Contributors:
-
Conference:International conference; 20th, Theory and application of cryptology and information security; Advances in cryptology - ASIACRYPT 2014 ; 2014 ; Kaohsiung, Taiwan
-
Published in:Theory and application of cryptology and information security; Advances in cryptology - ASIACRYPT 2014 , 8874 ; 62-81LECTURE NOTES IN COMPUTER SCIENCE , 8874 ; 62-81
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2014-01-01
-
Size:20 pages
-
Remarks:"e-ISSN 1611-3349" --Title page verso. Includes bibliographical references and indexes. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Solving LPN Using Covering CodesGuo, Q. / Johansson, T. / Londahl, C. et al. | 2014
- 1
-
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight SecurityLibert, B. / Joye, M. / Yung, M. / Peters, T. et al. | 2014
- 21
-
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special FormFaugere, J.-C. / Perret, L. / de Portzamparc, F. et al. | 2014
- 22
-
Efficient Identity-Based Encryption over NTRU LatticesDucas, L. / Lyubashevsky, V. / Prest, T. et al. | 2014
- 42
-
Order-Preserving Encryption Secure Beyond One-WaynessTeranishi, I. / Yung, M. / Malkin, T. et al. | 2014
- 42
-
Bivariate Polynomials Modulo Composites and Their ApplicationsBoneh, D. / Corrigan-Gibbs, H. et al. | 2014
- 62
-
Statistically-secure ORAM with O(log^2 n) OverheadChung, K.-M. / Liu, Z. / Pass, R. et al. | 2014
- 63
-
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key (Extended Abstract)Biryukov, A. / Bouillaguet, C. / Khovratovich, D. et al. | 2014
- 82
-
Adaptive Security of Constrained PRFsFuchsbauer, G. / Konstantinov, M. / Pietrzak, K. / Rao, V. et al. | 2014
- 85
-
Beyond 2^c^/^2 Security in Sponge-Based Authenticated Encryption ModesJovanovic, P. / Luykx, A. / Mennink, B. et al. | 2014
- 102
-
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs ObfuscationBellare, M. / Stepanovs, I. / Tessaro, S. et al. | 2014
- 105
-
How to Securely Release Unverified Plaintext in Authenticated EncryptionAndreeva, E. / Bogdanov, A. / Luykx, A. / Mennink, B. / Mouha, N. / Yasuda, K. et al. | 2014
- 122
-
Using Indistinguishability Obfuscation via UCEsBrzuska, C. / Mittelbach, A. et al. | 2014
- 126
-
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POETNandi, M. et al. | 2014
- 141
-
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128Emami, S. / Ling, S. / Nikolic, I. / Pieprzyk, J. / Wang, H. et al. | 2014
- 142
-
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary InputBrzuska, C. / Mittelbach, A. et al. | 2014
- 158
-
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block CiphersSun, S. / Hu, L. / Wang, P. / Qiao, K. / Ma, X. / Song, L. et al. | 2014
- 162
-
Bootstrapping Obfuscators via Fast Pseudorandom FunctionsApplebaum, B. et al. | 2014
- 173
-
Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext AttackJoo, C. / Yun, A. et al. | 2014
- 179
-
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and SimonBoura, C. / Naya-Plasencia, M. / Suder, V. et al. | 2014
- 193
-
Authenticating Computation on Groups: New Homomorphic Primitives and ApplicationsCatalano, D. / Marcedone, A. / Puglisi, O. et al. | 2014
- 200
-
A Simplified Representation of AESGilbert, H. et al. | 2014
- 213
-
Compact VSS and Efficient Homomorphic UC CommitmentsDamgard, I. / David, B. / Giacomelli, I. / Nielsen, J.B. et al. | 2014
- 223
-
Simulatable Leakage: Analysis, Pitfalls, and New ConstructionsLongo, J. / Martin, D.P. / Oswald, E. / Page, D. / Stam, M. / Tunstall, M.J. et al. | 2014
- 233
-
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only ModelJarecki, S. / Kiayias, A. / Krawczyk, H. et al. | 2014
- 243
-
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop ComputerMather, L. / Oswald, E. / Whitnall, C. et al. | 2014
- 254
-
Secret-Sharing for NPKomargodski, I. / Naor, M. / Yogev, E. et al. | 2014
- 262
-
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce BiasAranha, D.F. / Fouque, P.-A. / Gerard, B. / Kammerer, J.-G. / Tibouchi, M. / Zapalowicz, J.-C. et al. | 2014
- 274
-
Tweaks and Keys for Block Ciphers: The TWEAKEY FrameworkJean, J. / Nikolic, I. / Peyrin, T. et al. | 2014
- 282
-
Soft Analytical Side-Channel AttacksVeyrat-Charvillon, N. / Gerard, B. / Standaert, F.-X. et al. | 2014
- 289
-
Memory-Demanding Password ScramblingForler, C. / Lucks, S. / Wenzel, J. et al. | 2014
- 297
-
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve CryptographyDoche, C. et al. | 2014
- 306
-
Side-Channel Analysis of Multiplications in GF(2^1^2^8): Application to AES-GCMBelaid, S. / Fouque, P.-A. / Gerard, B. et al. | 2014
- 317
-
Kummer Strikes Back: New DH Speed RecordsBernstein, D.J. / Chuengsatiansup, C. / Lange, T. / Schwabe, P. et al. | 2014
- 326
-
Higher-Order Threshold ImplementationsBilgin, B. / Gierlichs, B. / Nikova, S. / Nikov, V. / Rijmen, V. et al. | 2014
- 338
-
Jacobian Coordinates on Genus 2 CurvesHisil, H. / Costello, C. et al. | 2014
- 344
-
Masks Will Fall Off: Higher-Order Optimal DistinguishersBruneau, N. / Guilley, S. / Heuser, A. / Rioul, O. et al. | 2014
- 358
-
Mersenne Factorization FactoryKleinjung, T. / Bos, J.W. / Lenstra, A.K. et al. | 2014
- 366
-
Black-Box Separations for One-More (Static) CDH and Its GeneralizationZhang, J. / Zhang, Z. / Chen, Y. / Guo, Y. et al. | 2014
- 378
-
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms: Simplified Setting for Small Characteristic Finite FieldsJoux, A. / Pierrot, C. et al. | 2014
- 386
-
Black-Box Separations for Differentially Private ProtocolsKhurana, D. / Maji, H.K. / Sahai, A. et al. | 2014
- 398
-
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)Paterson, K.G. / Poettering, B. / Schuldt, J.C.N. et al. | 2014
- 406
-
Composable Security of Delegated Quantum ComputationDunjko, V. / Fitzsimons, J.F. / Portmann, C. / Renner, R. et al. | 2014
- 420
-
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCEFouque, P.-A. / Joux, A. / Mavromati, C. et al. | 2014
- 426
-
All-But-Many Encryption: A New Framework for Fully-Equipped UC CommitmentsFujisaki, E. et al. | 2014
- 439
-
Cryptanalysis of Iterated Even-Mansour Schemes with Two KeysDinur, I. / Dunkelman, O. / Keller, N. / Shamir, A. et al. | 2014
- 448
-
Multi-valued Byzantine Broadcast: The t < n CaseHirt, M. / Raykov, P. et al. | 2014
- 448
-
Multi-valued Byzantine Broadcast: The t < n CaseHirt, Martin / Raykov, Pavel et al. | 2014
- 458
-
Meet-in-the-Middle Attacks on Generic Feistel ConstructionsGuo, J. / Jean, J. / Nikolic, I. / Sasaki, Y. et al. | 2014
- 466
-
Fairness versus Guaranteed Output Delivery in Secure Multiparty ComputationCohen, R. / Lindell, Y. et al. | 2014
- 478
-
XLS is Not a Strong Pseudorandom PermutationNandi, M. et al. | 2014
- 486
-
Actively Secure Private Function EvaluationMohassel, P. / Sadeghian, S. / Smart, N.P. et al. | 2014
- 491
-
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous CredentialsHanser, C. / Slamanig, D. et al. | 2014
- 506
-
Efficient, Oblivious Data Structures for MPCKeller, M. / Scholl, P. et al. | 2014
- 512
-
On Tight Security Proofs for Schnorr SignaturesFleischhacker, N. / Jager, T. / Schroder, D. et al. | 2014
- 532
-
Square Span Programs with Applications to Succinct NIZK ArgumentsDanezis, G. / Fournet, C. / Groth, J. / Kohlweiss, M. et al. | 2014
- 551
-
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group SignaturesBenhamouda, F. / Camenisch, J. / Krenn, S. / Lyubashevsky, V. / Neven, G. et al. | 2014