Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,057,456 papers from all fields of science
Search
Sign In
Create Free Account
Oblivious ram
An Oblivious RAM (ORAM) simulator is a compiler that transforms algorithms in such a way that the resulting algorithms preserve the input-output…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Broader (2)
Analysis of algorithms
Cache (computing)
Cache-oblivious algorithm
Compiler
Deterministic algorithm
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption
Jinsheng Zhang
,
Qiumao Ma
,
Wensheng Zhang
,
D. Qiao
Future Internet
2017
Corpus ID: 6178863
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client’s access pattern…
Expand
2016
2016
Oblivious RAM: from theory to practice
Christopher W. Fletcher
2016
Corpus ID: 63665828
Privacy of data storage has long been a central problem in computer security, having direct implications for many Internet-era…
Expand
2015
2015
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled
,
Chang Liu
,
Charalampos Papamanthou
,
E. Shi
,
U. Vishkin
Journal of Cryptology
2015
Corpus ID: 1108253
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untrusted memory, such that the…
Expand
2015
2015
Oblivious Network RAM
Dana Dachman-Soled
,
Chang Liu
,
Charalampos Papamanthou
,
E. Shi
,
U. Vishkin
IACR Cryptology ePrint Archive
2015
Corpus ID: 17363660
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untrusted memory, such that the…
Expand
2015
2015
Multi-User Oblivious RAM Secure Against Malicious Servers
Travis Mayberry
,
Erik-Oliver Blass
,
G. Noubir
IACR Cryptology ePrint Archive
2015
Corpus ID: 17074059
It has been an open question whether Oblivious RAM stored on a malicious server can be securely shared among multiple users…
Expand
2014
2014
Oblivious Parallel RAM
Elette Boyle
,
Kai-Min Chung
,
R. Pass
IACR Cryptology ePrint Archive
2014
Corpus ID: 11961419
A machine is said to be oblivious if the sequences of memory accesses made by the machine for two inputs with the same running…
Expand
2014
2014
Enhancing Oblivious RAM Performance Using Dynamic Prefetching
Xiangyao Yu
,
Ling Ren
,
Christopher W. Fletcher
,
Albert Kwon
,
Marten van Dijk
,
S. Devadas
IACR Cryptology ePrint Archive
2014
Corpus ID: 11952681
Oblivious RAM (ORAM) is an established technique to hide the access pattern to an untrusted storage system. With ORAM, a curious…
Expand
2014
2014
A Multi-user Oblivious RAM for Outsourced Data
Z. Jinsheng
,
Zhang Wen-sheng
,
D. Qiao
2014
Corpus ID: 9382057
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have…
Expand
2013
2013
Practical identification with encrypted biometric data using oblivious RAM
Julien Bringer
,
H. Chabanne
,
Alain Patey
International Conference on Biometrics
2013
Corpus ID: 6176976
Bringer et al. introduced a new primitive that enables identification over encrypted biometric data stored on a remote database…
Expand
1991
1991
Tight bounds for the chaining problem
S. Chaudhuri
ACM Symposium on Parallelism in Algorithms and…
1991
Corpus ID: 17296668
The chaining problem is defined as follows. Given values al, . . . . am, ai = O or 1, 1 ~ i ~ n, compute bl, . . . . bw, such…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE