Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Clicks: 220
ID: 96897
2019
Article Quality & Performance Metrics
Overall Quality
Improving Quality
0.0
/100
Combines engagement data with AI-assessed academic quality
Reader Engagement
Emerging Content
3.0
/100
10 views
10 readers
Trending
AI Quality Assessment
Not analyzed
Abstract
The ability to query and update over encrypted data is an essential feature to enable breach-resilient cyber-infrastructures. Statistical attacks on searchable encryption (SE) have demonstrated the importance of sealing information leaks in access patterns. In response to such attacks, the community has proposed the Oblivious Random Access Machine (ORAM). However, due to the logarithmic communication overhead of ORAM, the composition of ORAM and SE is known to be costly in the conventional client-server model, which poses a critical barrier toward its practical adaptations.
| Reference Key |
thang2019hardwaresupportedproceedings
Use this key to autocite in the manuscript while using
SciMatic Manuscript Manager or Thesis Manager
|
|---|---|
| Authors | Thang, Hoang;Ozgur, Ozmen Muslum;Yeongjin, Jang;A., Yavuz Attila; |
| Journal | proceedings on privacy enhancing technologies |
| Year | 2019 |
| DOI |
DOI not found
|
| URL | |
| Keywords |
Citations
No citations found. To add a citation, contact the admin at info@scimatic.org
Comments
No comments yet. Be the first to comment on this article.