243 research outputs found

    More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting

    Get PDF
    The problem of Oblivious RAM (ORAM) has traditionally been studied in a single-server setting, but more recently the multi-server setting has also been considered. Yet it is still unclear whether the multi-server setting has any inherent advantages, e.g., whether the multi-server setting can be used to achieve stronger security goals or provably better efficiency than is possible in the single-server case. In this work, we construct a perfectly secure 3-server ORAM scheme that outperforms the best known single-server scheme by a logarithmic factor. In the process, we also show, for the first time, that there exist specific algorithms for which multiple servers can overcome known lower bounds in the single-server setting.Comment: 36 pages, Accepted in Asiacrypt 201

    Shrinking Lung Syndrome in a Young Female: A Rare Pulmonary Manifestation of Systemic Lupus Erythematosus

    Get PDF
    Shrinking lung syndrome (SLS) is a rare pulmonary complication of autoimmune conditions. It has been sparsely described in the literature and its pathophysiology remains unclear. SLS is typically reported in patients with a history of systemic lupus erythematosus (SLE) who present with shortness of breath and chest pain associated with breathing. Chest imaging demonstrates no alveolar, interstitial, or pleural abnormalities. Pulmonary function tests (PFTs) are characterized by a restrictive pattern with reduced lung volumes. SLS is a diagnosis of exclusion and there are no validated criteria for the diagnosis. Evaluation requires extensive testing to rule out alternative causes of dyspnea and pleuritic chest pain. In this report, we present a case of SLS in a young African American woman

    Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead

    Get PDF
    Oblivious RAM (ORAM) has established itself as a fundamental cryptographic building block. Understanding which bandwidth overheads are possible under which assumptions has been the topic of a vast amount of previous works. In this work, we focus on perfectly secure ORAM and we present the first construction with sublinear bandwidth overhead in the worst-case. All prior constructions with perfect security require linear communication overhead in the worst-case and only achieve sublinear bandwidth overheads in the amortized sense. We present a fundamentally new approach for construction ORAM and our results significantly advance our understanding of what is possible with perfect security. Our main construction, Lookahead ORAM, is perfectly secure, has a worst-case bandwidth overhead of O(n)\mathcal{O}(\sqrt{n}), and a total storage cost of O(n)\mathcal{O}(n) on the server-side, where nn is the maximum number of stored data elements. In terms of concrete server-side storage costs, our construction has the smallest storage overhead among all perfectly and statistically secure ORAMs and is only a factor 3 worse than the most storage efficient computationally secure ORAM. Assuming a client-side position map, our construction is the first, among all ORAMs with worst-case sublinear overhead, that allows for a O(1)\mathcal{O}(1) online bandwidth overhead without server-side computation. Along the way, we construct a conceptually extremely simple statistically secure ORAM with a worst-case bandwidth overhead of O(nlognloglogn)\mathcal{O}(\sqrt{n}\frac{\log{n}}{\log{\log{n}}}), which may be of independent interest

    Visual Analytics Dashboard Promises to Improve Hypertension Guideline Implementation

    Get PDF
    BACKGROUND: Primary care management of hypertension under new guidelines incorporates assessment of cardiovascular disease risk and commonly requires review of electronic health record (EHR) data. Visual analytics can streamline the review of complex data and may lessen the burden clinicians face using the EHR. This study sought to assess the utility of a visual analytics dashboard in addition to EHR in managing hypertension in a primary care setting. METHODS: Primary care physicians within an urban, academic internal medicine clinic were tasked with performing two simulated patient encounters for HTN management: the first using standard EHR, and the second using EHR paired with a visual dashboard. The dashboard included graphical blood pressure trends with guideline-directed targets, calculated ASCVD risk score, and relevant medications. Guideline-appropriate antihypertensive prescribing, correct target blood pressure goal, and total encounter time were assessed. RESULTS: We evaluated 70 case simulations. Use of the dashboard with the EHR compared to use of the EHR alone was associated with greater adherence to prescribing guidelines (95% vs. 62%, p\u3c0.001) and more correct identification of BP target (95% vs. 57%, p\u3c0.01). Total encounter time fell an average of 121 seconds (95% CI 69 - 157 seconds, p\u3c0.001) in encounters that used the dashboard combined with the EHR. CONCLUSIONS: The integration of a hypertension-specific visual analytics dashboard with EHR demonstrates the potential to reduce time and improve hypertension guideline implementation. Further widespread testing in clinical practice is warranted

    Solid variant of aneurysmal bone cyst of the heel: a case report

    Get PDF
    <p>Abstract</p> <p>Introduction</p> <p>An aneurysmal bone cyst is a benign but often rapidly expanding osteolytic multi-cystic osseous lesion that occurs as a primary, secondary, intra-osseous, extra-osseous, solid or conventional lesion. It frequently coexists with other benign and malignant bone tumors. Although it is considered to be reactive in nature, there is evidence that some aneurysmal bone cysts are true neoplasms. The solid variant of aneurysmal bone cyst is a rare subtype of aneurysmal bone cyst with a preponderance of solid to cystic elements. Such a case affecting the heel, an unusual site, is reported.</p> <p>Case presentation</p> <p>A 26-year-old Caucasian man presented with pain and swelling in his left lower extremity. A plain radiograph demonstrated an intra-osseous, solitary, eccentric mass in the front portion of the left heel. Computed tomography and magnetic resonance imaging scans showed that the lesion appeared to be sub-cortical, solid with a small cystic portion without the characteristic fluid-fluid level detection but with distinct internal septation. Bone images containing fluid-fluid levels are usually produced by aneurysmal bone cysts. The fluid-fluid level due to bleeding within the tumor followed by layering of the blood components based density differences, but it was not seen in our case. An intra-lesional excision was performed. Microscopic examination revealed fibrous septa with spindle cell fibroblastic proliferation, capillaries and extensive areas of mature osteoid and reactive woven bone formation rimmed by osteoblasts. The spindle cells had low mitotic activity, and atypical forms were absent. The histological features of the lesion were consistent with the solid variant of an aneurysmal bone cyst.</p> <p>Conclusion</p> <p>Solid aneurysmal bone cysts have been of great interest to pathologists because they may be mistaken for malignant tumors, mainly in cases of giant cell tumors or osteosarcomas, because of cellularity and variable mitotic activity. It is rather obvious that the correlation of clinical, radiological and histological findings is necessary for the differential diagnosis. The eventual diagnosis is based on microscopic evidence and is made when a predominance of solid to cystic elements is found. The present case is of great interest because of the nature of the neoplasm and the extremely unusual location in which it developed. Pathologists must be alert for such a diagnosis.</p

    Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model

    Get PDF
    Encrypted multi-maps (EMMs) enable clients to outsource the storage of a multi-map to a potentially untrusted server while maintaining the ability to perform operations in a privacy-preserving manner. EMMs are an important primitive as they are an integral building block for many practical applications such as searchable encryption and encrypted databases. In this work, we formally examine the tradeoffs between privacy and efficiency for EMMs. Currently, all known dynamic EMMs with constant overhead reveal if two operations are performed on the same key or not that we denote as the global key-equality pattern\mathit{global\ key\text{-}equality\ pattern}. In our main result, we present strong evidence that the leakage of the global key-equality pattern is inherent for any dynamic EMM construction with O(1)O(1) efficiency. In particular, we consider the slightly smaller leakage of decoupled key-equality pattern\mathit{decoupled\ key\text{-}equality\ pattern} where leakage of key-equality between update and query operations is decoupled and the adversary only learns whether two operations of the same type\mathit{same\ type} are performed on the same key or not. We show that any EMM with at most decoupled key-equality pattern leakage incurs Ω(logn)\Omega(\log n) overhead in the leakage cell probe model\mathit{leakage\ cell\ probe\ model}. This is tight as there exist ORAM-based constructions of EMMs with logarithmic slowdown that leak no more than the decoupled key-equality pattern (and actually, much less). Furthermore, we present stronger lower bounds that encrypted multi-maps leaking at most the decoupled key-equality pattern but are able to perform one of either the update or query operations in the plaintext still require Ω(logn)\Omega(\log n) overhead. Finally, we extend our lower bounds to show that dynamic, response-hiding\mathit{response\text{-}hiding} searchable encryption schemes must also incur Ω(logn)\Omega(\log n) overhead even when one of either the document updates or searches may be performed in the plaintext
    corecore