Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2017 2017
DOI: 10.23919/date.2017.7927134
|View full text |Cite
|
Sign up to set email alerts
|

SCAM: Secured content addressable memory based on homomorphic encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…Reference [9] proposes a modification to the homomorphic XOR and AND operations, as defined in the FHEW scheme [7], such that searches on a secure CAM do not require expensive operations, such as multiplications, in order to guarantee the integrity of the data at decryption, that is, word matching can be entirely performed through additions, resulting in faster word matching compared to a conventional implementation [30]. Specifically, the word matching function of a CAM employs a XOR-OR variant instead of the original XNOR-AND form, which can be costly to implement in the hardware.…”
Section: Related Work: Cim and Hementioning
confidence: 99%
See 4 more Smart Citations
“…Reference [9] proposes a modification to the homomorphic XOR and AND operations, as defined in the FHEW scheme [7], such that searches on a secure CAM do not require expensive operations, such as multiplications, in order to guarantee the integrity of the data at decryption, that is, word matching can be entirely performed through additions, resulting in faster word matching compared to a conventional implementation [30]. Specifically, the word matching function of a CAM employs a XOR-OR variant instead of the original XNOR-AND form, which can be costly to implement in the hardware.…”
Section: Related Work: Cim and Hementioning
confidence: 99%
“…While x i ∈ {0, 1} represents a database entry, y i ∈ {0, 1} refers to a query. The index i represents the individual bits of each word, whose lengths are specified by w. The ciphertext for 1-bit plaintext is denoted as c x and c y and can be as long as (n + 1) log q bits (with n = 1052 and log q = 42, for a medium security standard that uses a 80-bit key, as defined in [9]). (Therefore, a 32-bit data word may translate to a homomorphically encrypted data vector that is >50 000 bits!…”
Section: Related Work: Cim and Hementioning
confidence: 99%
See 3 more Smart Citations