Applied Cryptography
  • Class webpage

Oblivious Sort and Oblivious Data Structures

By Omar AlSughayer and Grayson York

Posted on February 22, 2020

In the previous post to this blog, the authors described efficient methods for storing information obliviously, a scheme known as ORAM. They described powerful general paradigms which could store broad classes of data on an adversarial server. In this post, we will describe more specific applications of ORAM to a... [Read More]
Tags: oblivious computation

Introduction to Oblivious RAM

By Andrew Demma and Anurag Kashyap

Posted on February 15, 2020

In several settings, an eavesdropping adversary can learn sensitive information just from the memory access patterns in a computer/network. An access pattern is defined as a sequence $[A_1, A_2, \ldots ]$ of memory addresses that a user/client wants to access in the exact order in which they appear in the... [Read More]
Tags: oblivious computation
  • ← Newer Posts

    2021

    Powered by Beautiful Jekyll