Abstract. We show that oblivious on-line simulation with only polylogarithmic increase in the time and space requirements is possible on a probabilistic (coin flipping) RAM without using any cryptographic assumptions. The simulation will fail with a negligible probability. If n memory locations are used, then the probability of failure is at most n − logn. Pippenger and Fischer has shown in 1979, see [11], that a Turing machine with one-dimensional tapes, performing a computation of length n can be simulated on-line by an oblivious Turing machine with two dimensional tapes, in time O(n log n), where a Turing machine is oblivious if the movements of it heads as a function of time are independent of its input. For RAMs the notion of oblivious...
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures mode...
An Oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (JACM 1996), is a (probabilistic) RAM...
We consider integer random access machines (RAMs) that receive one of two types of special integers ...
Software protection is one of the most important issues concerning computer practice. There exist ma...
Rafail Ostrovsky z Software protection is one of the most important issues concerning computer pract...
Software protection is one of the most important issues concerning computer practice. There exist ma...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
We study the problem of providing privacy-preserving access to an outsourced honest-but-curious data...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
An oblivious 1-tape Turing machine can simulate a multicounter machine on-line in linear time and lo...
Oblivious RAM simulation is a method for achieving confidentiality and privacy in cloud computing en...
Abstract. We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which en...
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and Ostrovsky (STOC ...
An oblivious 1-tape Turing machine can on-line simulate a multicounter machine in linear time and lo...
Suppose a client, Alice, has outsourced her data to an external storage provider, Bob, because he ha...
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures mode...
An Oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (JACM 1996), is a (probabilistic) RAM...
We consider integer random access machines (RAMs) that receive one of two types of special integers ...
Software protection is one of the most important issues concerning computer practice. There exist ma...
Rafail Ostrovsky z Software protection is one of the most important issues concerning computer pract...
Software protection is one of the most important issues concerning computer practice. There exist ma...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
We study the problem of providing privacy-preserving access to an outsourced honest-but-curious data...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
An oblivious 1-tape Turing machine can simulate a multicounter machine on-line in linear time and lo...
Oblivious RAM simulation is a method for achieving confidentiality and privacy in cloud computing en...
Abstract. We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which en...
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and Ostrovsky (STOC ...
An oblivious 1-tape Turing machine can on-line simulate a multicounter machine in linear time and lo...
Suppose a client, Alice, has outsourced her data to an external storage provider, Bob, because he ha...
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures mode...
An Oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (JACM 1996), is a (probabilistic) RAM...
We consider integer random access machines (RAMs) that receive one of two types of special integers ...