Sciweavers

TCC
2016
Springer
42views Cryptology» more  TCC 2016»
10 years 16 days ago
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidth blowup that leverages poly-logarithmic server computation to circumvent the logarithmic lower bou...
Srinivas Devadas, Marten van Dijk, Christopher W. ...
TCC
2016
Springer
40views Cryptology» more  TCC 2016»
10 years 16 days ago
Oblivious Parallel RAM and Applications
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures modern multi-core architectures and cluster computing models, where several process...
Elette Boyle, Kai-Min Chung, Rafael Pass
TCC
2016
Springer
49views Cryptology» more  TCC 2016»
10 years 16 days ago
Functional Encryption for Turing Machines
Prabhanjan Vijendra Ananth, Amit Sahai
TCC
2016
Springer
47views Cryptology» more  TCC 2016»
10 years 16 days ago
Improved OR-Composition of Sigma-Protocols
In [CDS94] Cramer, Damg˚ard and Schoenmakers (CDS) devise an OR-composition technique for Σ-protocols that allows to construct highly-efficient proofs for compound statements. S...
Michele Ciampi, Giuseppe Persiano, Alessandra Scaf...
TCC
2016
Springer
42views Cryptology» more  TCC 2016»
10 years 16 days ago
Interactive Coding for Interactive Proofs
We consider interactive proof systems over adversarial communication channels. We show that the seminal result that IP = PSPACE still holds when the communication channel is malic...
Allison Bishop, Yevgeniy Dodis