Numerous high-profile works have shown that access patterns to even encrypted databases can leak secret information and sometimes even lead to reconstruction of the entire database. To thwart access pattern leakage, the literature has focused on {\it oblivious} algorithms, where obliviousness requires that the access patterns leak nothing about the input data. In this paper, we consider the {\tt Join} operator, an important database primitive that has been extensively studied and optimized. Unfortunately, any {\it fully oblivious} {\tt Join} algorithm would require {\it always} padding the result to the {\it worst-case} length which is {\it quadratic} in the data size $N$. In comparison, an insecure baseline incurs only $O(R + N)$ cost whe...
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud rem...
Existing studies on differential privacy mainly consider aggregation on data sets where each entry c...
As both the scope and scale of data collection increases, an increasingly large amount of sensitive ...
Numerous high-profile works have shown that access patterns to even encrypted databases can leak sec...
There has been a recent effort in applying differential privacy on memory access patterns to enhance...
It is well-known that a program\u27s memory access pattern can leak information about its input. To ...
In a recent paper, Chan et al. [SODA \u2719] proposed a relaxation of the notion of (full) memory ob...
Differential obliviousness (DO) access pattern privacy is a privacy notion which guarantees that the...
A major algorithmic challenge in designing applications intended for secure remote execution is ensu...
Motivated by cloud security concerns, there is an increasing in-terest in database systems that can ...
We study the cryptographic complexity of two-party differentially-private protocols for a large natu...
As secure processors such as Intel SGX (with hyperthreading) become widely adopted, there is a growi...
International audienceDifferential privacy aims at protecting the privacy of participants instatisti...
Database management systems operating over encrypted data are gaining significant commercial interes...
6 pages.-- Contributed to: X Spanish Meeting on Cryptology and Information Security (Salamanca, Spai...
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud rem...
Existing studies on differential privacy mainly consider aggregation on data sets where each entry c...
As both the scope and scale of data collection increases, an increasingly large amount of sensitive ...
Numerous high-profile works have shown that access patterns to even encrypted databases can leak sec...
There has been a recent effort in applying differential privacy on memory access patterns to enhance...
It is well-known that a program\u27s memory access pattern can leak information about its input. To ...
In a recent paper, Chan et al. [SODA \u2719] proposed a relaxation of the notion of (full) memory ob...
Differential obliviousness (DO) access pattern privacy is a privacy notion which guarantees that the...
A major algorithmic challenge in designing applications intended for secure remote execution is ensu...
Motivated by cloud security concerns, there is an increasing in-terest in database systems that can ...
We study the cryptographic complexity of two-party differentially-private protocols for a large natu...
As secure processors such as Intel SGX (with hyperthreading) become widely adopted, there is a growi...
International audienceDifferential privacy aims at protecting the privacy of participants instatisti...
Database management systems operating over encrypted data are gaining significant commercial interes...
6 pages.-- Contributed to: X Spanish Meeting on Cryptology and Information Security (Salamanca, Spai...
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud rem...
Existing studies on differential privacy mainly consider aggregation on data sets where each entry c...
As both the scope and scale of data collection increases, an increasingly large amount of sensitive ...