2022
DOI: 10.1007/978-3-031-22365-5_27
|View full text |Cite
|
Sign up to set email alerts
|

Bet-or-Pass: Adversarially Robust Bloom Filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…The widespread adoption of data sketches has put their security and privacy in the spotlight and recent works have shown that many of them are vulnerable in some settings [19], [20]. In particular, in the case of approximate membership check filters, the security and privacy of Bloom filters has been extensively studied showing that both their performance can be degraded and data can be extracted from the filter under certain conditions [21], [22], [23], [24], [25]. The security of cuckoo filters has also been studied showing that an attacker can create insertion failures [26].…”
Section: Introductionmentioning
confidence: 99%
“…The widespread adoption of data sketches has put their security and privacy in the spotlight and recent works have shown that many of them are vulnerable in some settings [19], [20]. In particular, in the case of approximate membership check filters, the security and privacy of Bloom filters has been extensively studied showing that both their performance can be degraded and data can be extracted from the filter under certain conditions [21], [22], [23], [24], [25]. The security of cuckoo filters has also been studied showing that an attacker can create insertion failures [26].…”
Section: Introductionmentioning
confidence: 99%