On the (in)security of hash-based oblivious RAM and a new balancing scheme.
Eyal KushilevitzSteve LuRafail OstrovskyPublished in: SODA (2012)
Keyphrases
- hash functions
- digital signature scheme
- identity based cryptography
- main memory
- authentication scheme
- security requirements
- high security
- information security
- statistical databases
- protection scheme
- authentication mechanism
- diffie hellman
- provably secure
- key management scheme
- electronic voting
- database systems
- chosen plaintext
- security analysis
- security issues
- intrusion detection
- secure communication
- private key
- security model
- signcryption scheme
- graphical password
- elliptic curve
- transitive closure
- access control
- database