Efficient oblivious database joins

@article{Krastnikov2020EfficientOD,
  title={Efficient oblivious database joins},
  author={Simeon Krastnikov and F. Kerschbaum and D. Stebila},
  journal={Proceedings of the VLDB Endowment},
  year={2020},
  volume={13},
  pages={2132 - 2145}
}
A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that they are oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive information to the server. This problem is particularly relevant to cloud databases that wish to allow queries over the client's encrypted data. One of the major obstacles to such a goal is the join operator, which is non-trivial to implement obliviously without resorting to generic… Expand
3 Citations
Secrecy: Secure collaborative analytics on secret-shared data
  • PDF
Equi-Joins Over Encrypted Data for Series of Queries
  • PDF
Secure and Efficient Trajectory-Based Contact Tracing using Trusted Hardware
  • 1
  • PDF

References

SHOWING 1-10 OF 11 REFERENCES
ObliDB: Oblivious Query Processing for Secure Databases
  • 18
  • Highly Influential
  • PDF
Oblivious Query Processing
  • 41
  • Highly Influential
  • PDF
Privacy-preserving data-oblivious geometric algorithms for geographic data
  • 33
  • Highly Influential
  • PDF
SMCQL: Secure Querying for Federated Databases
  • 42
  • Highly Influential
  • PDF
Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
  • 32
  • Highly Influential
  • PDF
Software protection and simulation on oblivious RAMs
  • 1,418
  • Highly Influential
  • PDF
Path ORAM: an extremely simple oblivious RAM protocol
  • 326
  • Highly Influential
  • PDF
Towards a theory of software protection and simulation by oblivious RAMs
  • 418
  • Highly Influential
Data-Oblivious Graph Algorithms in Outsourced External Memory
  • 9
  • Highly Influential
  • PDF
Intel SGX Explained
  • 851
  • Highly Influential
  • PDF
...
1
2
...