Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
Sok: General purpose compilers for secure multi-party computation
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …
compute a joint function on their inputs without revealing any information beyond the result …
Tinygarble: Highly compressed and scalable sequential garbled circuits
We introduce Tiny Garble, a novel automated methodology based on powerful logic
synthesis techniques for generating and optimizing compressed Boolean circuits used in …
synthesis techniques for generating and optimizing compressed Boolean circuits used in …
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
Deciding “greater-than” relations among data items just given their encryptions is at the
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …
Indistinguishability obfuscation from compact functional encryption
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …
landscape by enabling several security goals that were previously beyond our reach …
Doubly efficient private information retrieval and fully homomorphic RAM computation from ring LWE
A (single server) private information retrieval (PIR) allows a client to read data from a public
database held on a remote server, without revealing to the server which locations she is …
database held on a remote server, without revealing to the server which locations she is …
Identity-based encryption from the Diffie-Hellman assumption
N Döttling, S Garg - Annual international cryptology conference, 2017 - Springer
We provide the first constructions of identity-based encryption and hierarchical identity-
based encryption based on the hardness of the (Computational) Diffie-Hellman Problem …
based encryption based on the hardness of the (Computational) Diffie-Hellman Problem …
TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption
We present TWORAM, an asymptotically efficient oblivious RAM (ORAM) protocol providing
oblivious access (read and write) of a memory index y in exactly two rounds: The client …
oblivious access (read and write) of a memory index y in exactly two rounds: The client …
Two-round multiparty secure computation from minimal assumptions
S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …
Onion ORAM: A constant bandwidth blowup oblivious RAM
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …