We consider oblivious two-party protocols where a client outsources N blocks of private data to a server. The client wishes to access the data to perform operations in such a way that the access pattern does not leak information about the data and the operations. In this context, we consider oblivious shuffling with a focus on bandwidth e cient protocols for clients with small local memory. In the shuffling problem, the N outsourced blocks, B1, . . ., BN, are stored on the server according to an initial permutation π. The client wishes to reshuffle the blocks according to permutation σ. Oblivious shuffling is a building block in several applications that hide patterns of data access. In this paper, we introduce a generalization of the obliv...
Abstract We adapt the distribution sweeping method to the cache oblivious model. Distribution sweepi...
Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must ...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the ...
Abstract. We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which en...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
Several privacy-preserving analytics frameworks have been proposed that use trusted execution enviro...
We study the question of how to shuffle n cards when faced with an opponent who knows the initial po...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
Abstract We adapt the distribution sweeping method to the cache oblivious model. Distribution sweepi...
Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must ...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the ...
Abstract. We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which en...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
Several privacy-preserving analytics frameworks have been proposed that use trusted execution enviro...
We study the question of how to shuffle n cards when faced with an opponent who knows the initial po...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
Abstract We adapt the distribution sweeping method to the cache oblivious model. Distribution sweepi...
Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must ...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...