Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

Tinygarble: Highly compressed and scalable sequential garbled circuits

EM Songhori, SU Hussain, AR Sadeghi… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We introduce Tiny Garble, a novel automated methodology based on powerful logic
synthesis techniques for generating and optimizing compressed Boolean circuits used in …

Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation

D Boneh, K Lewi, M Raykova, A Sahai… - … Conference on the …, 2015 - Springer
Deciding “greater-than” relations among data items just given their encryptions is at the
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …

Indistinguishability obfuscation from compact functional encryption

P Ananth, A Jain - Annual Cryptology Conference, 2015 - Springer
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …

Doubly efficient private information retrieval and fully homomorphic RAM computation from ring LWE

WK Lin, E Mook, D Wichs - Proceedings of the 55th Annual ACM …, 2023 - dl.acm.org
A (single server) private information retrieval (PIR) allows a client to read data from a public
database held on a remote server, without revealing to the server which locations she is …

Identity-based encryption from the Diffie-Hellman assumption

N Döttling, S Garg - Annual international cryptology conference, 2017 - Springer
We provide the first constructions of identity-based encryption and hierarchical identity-
based encryption based on the hardness of the (Computational) Diffie-Hellman Problem …

TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption

S Garg, P Mohassel, C Papamanthou - Annual International Cryptology …, 2016 - Springer
We present TWORAM, an asymptotically efficient oblivious RAM (ORAM) protocol providing
oblivious access (read and write) of a memory index y in exactly two rounds: The client …

Two-round multiparty secure computation from minimal assumptions

S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …

Onion ORAM: A constant bandwidth blowup oblivious RAM

S Devadas, M van Dijk, CW Fletcher, L Ren… - Theory of Cryptography …, 2016 - Springer
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …