Oblivious RAM Revisited

被引:0
|
作者
Pinkas, Benny [1 ]
Reinman, Tzachy [2 ]
机构
[1] Univ Haifa, Dept Comp Sci, IL-31905 Haifa, Israel
[2] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, IL-91905 Jerusalem, Israel
来源
基金
欧洲研究理事会; 以色列科学基金会;
关键词
Secure two-party computation; oblivious RAM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client; that can store locally only a constant amount of data, to store remotely n data items, and access them while hiding the identities of the items which are being accessed. Oblivious RAM is often cited as a powerful tool, but is also commonly considered to be impractical due to its overhead, which is asymptotically efficient but is quite high. We redesign the oblivious RAM protocol using modern tools, namely Cuckoo hashing and a new oblivious sorting algorithm. The resulting protocol uses only O(n) external memory; and replaces each data request by only O(log(2) n) requests.
引用
收藏
页码:502 / +
页数:4
相关论文
共 50 条
  • [31] Dynamic Proofs of Retrievability Via Oblivious RAM
    David Cash
    Alptekin Küpçü
    Daniel Wichs
    [J]. Journal of Cryptology, 2017, 30 : 22 - 57
  • [32] Dynamic Proofs of Retrievability Via Oblivious RAM
    Cash, David
    Kupcu, Alptekin
    Wichs, Daniel
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (01) : 22 - 57
  • [33] Dynamic Proofs of Retrievability via Oblivious RAM
    Cash, David
    Kupcu, Alptekin
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 279 - 295
  • [34] Is There an Oblivious RAM Lower Bound for Online Reads?
    Weiss, Mor
    Wichs, Daniel
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 603 - 635
  • [35] Garbled RAM Revisited
    Gentry, Craig
    Halevi, Shai
    Lu, Steve
    Ostrovsky, Rafail
    Raykova, Mariana
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 405 - 422
  • [36] Oblivious Polynomial Evaluation in the Exponent, Revisited
    Itakura, Naota
    Kurosawa, Kaoru
    Yoneyama, Kazuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 26 - 33
  • [37] A Logarithmic Lower Bound for Oblivious RAM (for All Parameters)
    Komargodski, Ilan
    Lin, Wei-Kai
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 579 - 609
  • [38] Adaptive Garbled RAM from Laconic Oblivious Transfer
    Garg, Sanjam
    Ostrovsky, Rafail
    Srinivasan, Akshayaram
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 515 - 544
  • [39] A Practical Accountability Scheme for Oblivious RAM in Cloud Storage
    Cao, Huikang
    Li, Ruixuan
    Tian, Wenlong
    Xu, Zhiyong
    Xiao, Weijun
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 397 - 402
  • [40] Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
    Dachman-Soled, Dana
    Liu, Chang
    Papamanthou, Charalampos
    Shi, Elaine
    Vishkin, Uzi
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 337 - 359