Show simple item record

dc.contributor.authorRen, Ling
dc.contributor.authorYu, Xiangyao
dc.contributor.authorDevadas, Srinivas
dc.contributor.authorFletcher, Christopher Wardlaw
dc.contributor.authorVan Dijk, Marten
dc.date.accessioned2014-04-14T18:45:36Z
dc.date.available2014-04-14T18:45:36Z
dc.date.issued2013-09
dc.identifier.isbn978-1-4799-1365-7
dc.identifier.isbn978-1-4799-1364-0
dc.identifier.urihttp://hdl.handle.net/1721.1/86167
dc.description.abstractOblivious-RAMs (ORAM) are used to hide memory access patterns. Path ORAM has gained popularity due to its efficiency and simplicity. In this paper, we propose an efficient integrity verification layer for Path ORAM, which only imposes 17% latency overhead. We also show that integrity verification is vital to maintaining privacy for recursive Path ORAMs under active adversaries.en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/HPEC.2013.6670339en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleIntegrity verification for path Oblivious-RAMen_US
dc.typeArticleen_US
dc.identifier.citationRen, Ling, Christopher W. Fletcher, Xiangyao Yu, Marten van Dijk, and Srinivas Devadas. “Integrity Verification for Path Oblivious-RAM.” 2013 IEEE High Performance Extreme Computing Conference (HPEC) (n.d.).en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorRen, Lingen_US
dc.contributor.mitauthorFletcher, Christopher Wardlawen_US
dc.contributor.mitauthorYu, Xiangyaoen_US
dc.contributor.mitauthorVan Dijk, Martenen_US
dc.contributor.mitauthorDevadas, Srinivasen_US
dc.relation.journalProceedings of the 2013 IEEE High Performance Extreme Computing Conference (HPEC)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsRen, Ling; Fletcher, Christopher W.; Yu, Xiangyao; van Dijk, Marten; Devadas, Srinivasen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-8253-7714
dc.identifier.orcidhttps://orcid.org/0000-0003-4317-3457
dc.identifier.orcidhttps://orcid.org/0000-0003-3437-7570
dc.identifier.orcidhttps://orcid.org/0000-0002-1224-0314
dc.identifier.orcidhttps://orcid.org/0000-0003-1467-2150
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record