We introduce the notion of oblivious data structure, motivated by the use of data structures in cryptography. Informally, an oblivious data structure yields no knowledge about the sequence of operations that have been applied to it other than the final result of the operations. In particular we define Oblivious Tree, a data structure very similar to 2-3 Tree, but with the additional property that the only information conveyed by an Oblivious Tree is the set of values stored at its leaves. This property is achieved through the use of randomization by the update algorithms. We use the Oblivious Tree data structure to solve the privacy problem for incremental digital signatures raised by Bellare, Goldreich and Goldwasser. An incremental signin...
Motivated by privacy preservation for outsourced data, data-oblivious external memory is a computati...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
Data sharing with multiple parties over a third-party distribution framework requires that both data...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
Abstract—We are among the first to systematically investigate (memory-trace) oblivious data structur...
We design novel, asymptotically more efficient data structures and algorithms for programs whose dat...
Abstract. An oblivious signature with n keys (or messages) is a sig-nature that the recipient can ch...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
We consider the problem of a client querying an encrypted binary tree structure, outsourced to an un...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
During this Thesis we investigated the possibilities that Identity-based Encryption offers when used...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
Motivated by privacy preservation for outsourced data, data-oblivious external memory is a computati...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
Data sharing with multiple parties over a third-party distribution framework requires that both data...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
Abstract—We are among the first to systematically investigate (memory-trace) oblivious data structur...
We design novel, asymptotically more efficient data structures and algorithms for programs whose dat...
Abstract. An oblivious signature with n keys (or messages) is a sig-nature that the recipient can ch...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
We consider the problem of a client querying an encrypted binary tree structure, outsourced to an un...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
During this Thesis we investigated the possibilities that Identity-based Encryption offers when used...
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the fir...
Motivated by privacy preservation for outsourced data, data-oblivious external memory is a computati...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
Data sharing with multiple parties over a third-party distribution framework requires that both data...