Several privacy-preserving analytics frameworks have been proposed that use trusted execution environments (TEEs) like Intel SGX. Such frameworks often use compaction and shuffling as core primitives. However, due to advances in TEE side-channel attacks, these primitives, and the applications that use them, should be _fully oblivious_; that is, perform instruction sequences and memory accesses that do not depend on the secret inputs. Such obliviousness would eliminate the threat of leaking private information through memory or timing side channels, but achieving it naively can result in a significant performance cost. In this work, we present fast, fully oblivious algorithms for compaction and shuffling. We implement and evaluate our desig...
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is o...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
As secure processors such as Intel SGX (with hyperthreading) become widely adopted, there is a growi...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
In tight compaction one is given an array of balls some of which are marked 0 and the rest are marke...
Privacy preserving computation is gaining importance. Along with secure computation guarantees, it i...
Although external-memory sorting has been a classical algorithms abstraction and has been heavily st...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and Ostrovsky (STOC ...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is o...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
Data-oblivious algorithms are a key component of many secure computation protocols. In this work, w...
As secure processors such as Intel SGX (with hyperthreading) become widely adopted, there is a growi...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
In tight compaction one is given an array of balls some of which are marked 0 and the rest are marke...
Privacy preserving computation is gaining importance. Along with secure computation guarantees, it i...
Although external-memory sorting has been a classical algorithms abstraction and has been heavily st...
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a cl...
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and Ostrovsky (STOC ...
We are witnessing a confluence between applied cryptography and secure hardware systems in enabling ...
We design and implement a Distributed Oblivious Random Access Memory (ORAM) data structure that is o...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...