2020
DOI: 10.48550/arxiv.2003.09481
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Efficient Oblivious Database Joins

Simeon Krastnikov,
Florian Kerschbaum,
Douglas Stebila

Abstract: A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that they are oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive information to the server. This problem is particularly relevant to cloud databases that wish to allow queries over the client's encrypted data. One of the major obstacles to such a goal is the join operator, which is non-trivial to implement obliviously without resorting to generic but inefficient … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Such a non-obliviousness can be vulnerable even in recent TEE implementations. A lot of attack works [26]- [28] and countermeasures [29]- [31]. We should study how dangerous non-oblivious PSI based on the trusted hardware is and how to change our algorithm to dataoblivious leakage with small overhead.…”
Section: Future Workmentioning
confidence: 99%
“…Such a non-obliviousness can be vulnerable even in recent TEE implementations. A lot of attack works [26]- [28] and countermeasures [29]- [31]. We should study how dangerous non-oblivious PSI based on the trusted hardware is and how to change our algorithm to dataoblivious leakage with small overhead.…”
Section: Future Workmentioning
confidence: 99%