Privacy-preserving access of outsourced data via oblivious RAM simulation

132Citations
Citations of this article
59Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We describe schemes for the oblivious RAM simulation problem with a small logarithmic or polylogarithmic amortized increase in access times, with a very high probability of success, while keeping the external storage to be of size O(n). © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Goodrich, M. T., & Mitzenmacher, M. (2011). Privacy-preserving access of outsourced data via oblivious RAM simulation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6756 LNCS, pp. 576–587). https://doi.org/10.1007/978-3-642-22012-8_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free