IEEE INFOCOM 2018 - IEEE Conference on Computer Communications 2018
DOI: 10.1109/infocom.2018.8485838
|View full text |Cite
|
Sign up to set email alerts
|

REARGUARD: Secure Keyword Search Using Trusted Hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
24
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 16 publications
0
24
0
Order By: Relevance
“…State-of-the-art Hardware-Supported Oblivious Search Platforms. Existing systems [25,73] require secure hardware (e.g., Intel SGX) to process the entire outsourced data (e.g., encryption/decryption) for each search query to completely hide the access pattern. Unfortunately, this approach might also incur a high delay when dealing with a large amount of outsourced data since its cost grows linearly with the database size.…”
Section: Motivationmentioning
confidence: 99%
“…State-of-the-art Hardware-Supported Oblivious Search Platforms. Existing systems [25,73] require secure hardware (e.g., Intel SGX) to process the entire outsourced data (e.g., encryption/decryption) for each search query to completely hide the access pattern. Unfortunately, this approach might also incur a high delay when dealing with a large amount of outsourced data since its cost grows linearly with the database size.…”
Section: Motivationmentioning
confidence: 99%
“…Sun et al 190 utilized Intel SGX and AMD memory encryption for secure computation such that even if the software is untrusted, a secure computation can still be performed. The proposed scheme is able to offer better query expressiveness while maintaining query privacy.…”
mentioning
confidence: 99%
“…Hardware-based 48,190,[192][193][194] searchable encryption is software-based implementation, where the functionality is incorporated in the underlying protocol, and researchers have proposed numerous methods such as pseudorandom functions and generators, homomorphic encryption, inner product similarity, hash functions, bilinear maps, etc (discussed in Section 3.6). These schemes rely on using cryptography and theoretical proofs of the proposed algorithmic designs.…”
mentioning
confidence: 99%
See 2 more Smart Citations