On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme.
Eyal KushilevitzSteve LuRafail OstrovskyPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- hash functions
- electronic voting
- digital signature scheme
- protection scheme
- identity based cryptography
- access control
- intrusion detection
- authentication scheme
- security requirements
- security issues
- secret sharing scheme
- elliptic curve cryptography
- security analysis
- key management
- security policies
- main memory
- statistical databases
- authentication protocol
- network security
- information security
- key distribution
- public key cryptosystem
- provably secure
- elliptic curve
- high security
- secure communication
- private key
- security model
- information systems
- wireless networks
- query processing
- database systems