Splinecnn: Fast geometric deep learning with continuous b-spline kernels
Abstract We present Spline-based Convolutional Neural Networks (SplineCNNs), a variant
of deep neural networks for irregular structured and geometric input, eg, graphs or meshes …
of deep neural networks for irregular structured and geometric input, eg, graphs or meshes …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
ZeroTrace: Oblivious memory primitives from Intel SGX
We are witnessing a confluence between applied cryptography and secure hardware
systems in enabling secure cloud computing. On one hand, work in applied cryptography …
systems in enabling secure cloud computing. On one hand, work in applied cryptography …
Searchable symmetric encryption with forward search privacy
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …
A privacy-preserving and untraceable group data sharing scheme in cloud computing
J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …
Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …
Cloud computing security: foundations and research directions
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …
computation come with security and privacy concerns. This monograph explores the …
Onion ORAM: A constant bandwidth blowup oblivious RAM
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …