[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Le et al., 2020 - Google Patents

A tale of two trees: one writes, and other reads

Le et al., 2020

View PDF
Document ID
2246385775743281012
Author
Le D
Hurtado L
Ahmad A
Minaei M
Lee B
Kate A
Publication year
Publication venue
Proceedings on Privacy Enhancing Technologies

External Links

Snippet

The Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal devices of any kind …
Continue reading at petsymposium.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Hoang et al. Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset
Gueron Memory encryption for general-purpose processors
CN109643359B (en) Verification of control key-value store
Dai et al. SBLWT: A secure blockchain lightweight wallet based on trustzone
Checkoway et al. Iago attacks: Why the system call API is a bad untrusted RPC interface
KR100996784B1 (en) Saving and retrieving data based on public key encryption
ES2881486T3 (en) System and method of obfuscating an identifier to protect the identifier from unauthorized appropriation
Le et al. A tale of two trees: one writes, and other reads
CN107506659B (en) Data protection system and method of general database based on SGX
US11392724B2 (en) Method for accelerating execution of application in a trusted execution environment
Hoang et al. MOSE: Practical multi-user oblivious storage via secure enclaves
Choi et al. A hybrid approach to secure function evaluation using SGX
Tople et al. {PRO-ORAM}: Practical {Read-Only} Oblivious {RAM}
Dai et al. Trustzone-based secure lightweight wallet for hyperledger fabric
Drucker et al. Combining homomorphic encryption with trusted execution environment: a demonstration with paillier encryption and SGX
Rabimba et al. Lessons learned from blockchain applications of trusted execution environments and implications for future research
Fuhry et al. Hardidx: Practical and secure index with SGX in a malicious environment
Jakkamsetti et al. Scalable private signaling
Zhao et al. A private user data protection mechanism in trustzone architecture based on identity authentication
Coppolino et al. Exploiting new CPU extensions for secure exchange of eHealth data at the EU level
McGregor et al. Protecting cryptographic keys and computations via virtual secure coprocessing
Bhudia et al. RansomClave: ransomware key management using SGX
Le et al. A tale of two trees: One writes, and other reads. optimized oblivious accesses to large-scale blockchains
Bakas et al. Nowhere to leak: Forward and backward private symmetric searchable encryption in the multi-client setting (extended version)
Shin Multibyte microarchitectural data sampling and its application to session key extraction attacks