Abstract. We present an oblivious machine, a concrete notion for a multiparty random access machine (RAM) computation and a toolchain to allow the efficient execution of general programs written in a subset of C that allows RAM-model computation over the integers. The machine only leaks the list of possible instructions and the running time. Our work is based on the oblivious array for secret-sharing-based multiparty computation by Keller and Scholl (Asiacrypt ‘14). This means that we only incur a polylogarithmic overhead over the execution on a normal CPU. We describe an implementation of our construction using the Clang compiler from the LLVM project and the SPDZ protocol by Damg̊ard et al. (Crypto ‘12). The latter provides active securit...
We present Private Random Access Computations (PRAC), a 3-party Secure Multi-Party Computation (MPC)...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Software protection is one of the most important issues concerning computer practice. There exist ma...
Graduation date: 2016Secure multi-party computation (MPC) is a conceptual framework in cryptography....
Abstract. We present oblivious implementations of several data structures for secure multiparty com-...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures mode...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
We present a runtime environment for executing secure programs via a multi-party computation protoco...
Secure Multi-Party Computation (MPC) is a concept that includes a system of n participants communica...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
Abstract. We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which en...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
We present Private Random Access Computations (PRAC), a 3-party Secure Multi-Party Computation (MPC)...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Software protection is one of the most important issues concerning computer practice. There exist ma...
Graduation date: 2016Secure multi-party computation (MPC) is a conceptual framework in cryptography....
Abstract. We present oblivious implementations of several data structures for secure multiparty com-...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures mode...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
We present a runtime environment for executing secure programs via a multi-party computation protoco...
Secure Multi-Party Computation (MPC) is a concept that includes a system of n participants communica...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
Abstract. We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which en...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
We present Private Random Access Computations (PRAC), a 3-party Secure Multi-Party Computation (MPC)...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Software protection is one of the most important issues concerning computer practice. There exist ma...