Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science 2016
DOI: 10.1145/2840728.2840769
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography for Parallel RAM from Indistinguishability Obfuscation

Abstract: Since many cryptographic schemes are about performing computation on data, it is important to consider a computation model which captures the prominent features of modern system architecture. Parallel random access machine (PRAM) is such an abstraction which not only models multiprocessor platforms, but also new frameworks supporting massive parallel computation such as MapReduce.In this work, we explore the feasibility of designing cryptographic solutions for the PRAM model of computation to achieve security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 24 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…General-purpose techniques for verifiable computation [19,9,10,20,11,15] and their implementations [30,29] are potential solutions to the problem. To use these systems, the computation of the multi-pattern matching is either modeled as a circuit [28,16] or as a RAM program [14,31,6,7,15]. In circuit-based VC, the whole pattern set must be hardcoded into the circuit, which makes the computation on the server side inefficient (quasi-linear in the circuit size).…”
Section: Related Workmentioning
confidence: 99%
“…General-purpose techniques for verifiable computation [19,9,10,20,11,15] and their implementations [30,29] are potential solutions to the problem. To use these systems, the computation of the multi-pattern matching is either modeled as a circuit [28,16] or as a RAM program [14,31,6,7,15]. In circuit-based VC, the whole pattern set must be hardcoded into the circuit, which makes the computation on the server side inefficient (quasi-linear in the circuit size).…”
Section: Related Workmentioning
confidence: 99%