@@ -18,7 +18,7 @@ These solution has never been benchmarked against each other under a common test
...
@@ -18,7 +18,7 @@ These solution has never been benchmarked against each other under a common test
Even their security definitions and leakages are different, some definitions define a clear leakage function, like the first differing bit, others use indistinguishability definitions.
Even their security definitions and leakages are different, some definitions define a clear leakage function, like the first differing bit, others use indistinguishability definitions.
What is worse is that some construction were only theoretical while most of others had only a prototype implementation.
What is worse is that some construction were only theoretical while most of others had only a prototype implementation.
Our work fills these addresses these problems.
Our work addresses these problems.
We have implemented 5 ORE schemes and 5 range query protocols.
We have implemented 5 ORE schemes and 5 range query protocols.
We provide detailed theoretical analysis of their security and performance.
We provide detailed theoretical analysis of their security and performance.
We implemented them in the same language and the same framework.
We implemented them in the same language and the same framework.