| dc.contributor.author | Ren, Ling | |
| dc.contributor.author | Yu, Xiangyao | |
| dc.contributor.author | Devadas, Srinivas | |
| dc.contributor.author | Fletcher, Christopher Wardlaw | |
| dc.contributor.author | Van Dijk, Marten | |
| dc.date.accessioned | 2014-04-14T18:45:36Z | |
| dc.date.available | 2014-04-14T18:45:36Z | |
| dc.date.issued | 2013-09 | |
| dc.identifier.isbn | 978-1-4799-1365-7 | |
| dc.identifier.isbn | 978-1-4799-1364-0 | |
| dc.identifier.uri | http://hdl.handle.net/1721.1/86167 | |
| dc.description.abstract | Oblivious-RAMs (ORAM) are used to hide memory access patterns. Path ORAM has gained popularity due to its efficiency and simplicity. In this paper, we propose an efficient integrity verification layer for Path ORAM, which only imposes 17% latency overhead. We also show that integrity verification is vital to maintaining privacy for recursive Path ORAMs under active adversaries. | en_US |
| dc.language.iso | en_US | |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
| dc.relation.isversionof | http://dx.doi.org/10.1109/HPEC.2013.6670339 | en_US |
| dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
| dc.source | MIT web domain | en_US |
| dc.title | Integrity verification for path Oblivious-RAM | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Ren, Ling, Christopher W. Fletcher, Xiangyao Yu, Marten van Dijk, and Srinivas Devadas. “Integrity Verification for Path Oblivious-RAM.” 2013 IEEE High Performance Extreme Computing Conference (HPEC) (n.d.). | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.contributor.mitauthor | Ren, Ling | en_US |
| dc.contributor.mitauthor | Fletcher, Christopher Wardlaw | en_US |
| dc.contributor.mitauthor | Yu, Xiangyao | en_US |
| dc.contributor.mitauthor | Van Dijk, Marten | en_US |
| dc.contributor.mitauthor | Devadas, Srinivas | en_US |
| dc.relation.journal | Proceedings of the 2013 IEEE High Performance Extreme Computing Conference (HPEC) | en_US |
| dc.eprint.version | Author's final manuscript | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dspace.orderedauthors | Ren, Ling; Fletcher, Christopher W.; Yu, Xiangyao; van Dijk, Marten; Devadas, Srinivas | en_US |
| dc.identifier.orcid | https://orcid.org/0000-0001-8253-7714 | |
| dc.identifier.orcid | https://orcid.org/0000-0003-4317-3457 | |
| dc.identifier.orcid | https://orcid.org/0000-0003-3437-7570 | |
| dc.identifier.orcid | https://orcid.org/0000-0002-1224-0314 | |
| dc.identifier.orcid | https://orcid.org/0000-0003-1467-2150 | |
| mit.license | OPEN_ACCESS_POLICY | en_US |
| mit.metadata.status | Complete | |