| ... | ... | @@ -18,7 +18,7 @@ These solution has never been benchmarked against each other under a common test |
|
|
|
Even their security definitions and leakages are different, some definitions define a clear leakage function, like the first differing bit, others use indistinguishability definitions.
|
|
|
|
What is worse is that some construction were only theoretical while most of others had only a prototype implementation.
|
|
|
|
|
|
|
|
Our work fills these addresses these problems.
|
|
|
|
Our work addresses these problems.
|
|
|
|
We have implemented 5 ORE schemes and 5 range query protocols.
|
|
|
|
We provide detailed theoretical analysis of their security and performance.
|
|
|
|
We implemented them in the same language and the same framework.
|
| ... | ... | |
| ... | ... | |