Splinecnn: Fast geometric deep learning with continuous b-spline kernels

M Fey, JE Lenssen, F Weichert… - Proceedings of the …, 2018 - openaccess.thecvf.com
Abstract We present Spline-based Convolutional Neural Networks (SplineCNNs), a variant
of deep neural networks for irregular structured and geometric input, eg, graphs or meshes …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

Path ORAM: an extremely simple oblivious RAM protocol

E Stefanov, M Dijk, E Shi, THH Chan… - Journal of the ACM …, 2018 - dl.acm.org
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …

ZeroTrace: Oblivious memory primitives from Intel SGX

S Sasy, S Gorbunov, CW Fletcher - Cryptology ePrint Archive, 2017 - eprint.iacr.org
We are witnessing a confluence between applied cryptography and secure hardware
systems in enabling secure cloud computing. On one hand, work in applied cryptography …

Searchable symmetric encryption with forward search privacy

J Li, Y Huang, Y Wei, S Lv, Z Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …

Circuit oram: On tightness of the goldreich-ostrovsky lower bound

X Wang, H Chan, E Shi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes
both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM …

A privacy-preserving and untraceable group data sharing scheme in cloud computing

J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

Onion ORAM: A constant bandwidth blowup oblivious RAM

S Devadas, M van Dijk, CW Fletcher, L Ren… - Theory of Cryptography …, 2016 - Springer
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth
blowup that leverages poly-logarithmic server computation to circumvent the logarithmic …