Perfectly Secure Oblivious Priority Queue

被引:0
|
作者
Ichikawa, Atsunori [1 ]
Ogata, Wakaha [2 ]
机构
[1] NTT Social Informat Labs, Musashino 1808585, Japan
[2] Tokyo Inst Technol, Tokyo 1528550, Japan
关键词
key oblivious data structure; oblivious priority queue; perfect security;
D O I
10.1587/transfun.2022CIP0019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An Oblivious Priority Queue (OPQ) is a cryptographic primitive that enables a client to outsource its data to a dishonest server, and also to securely manage the data according to a priority queue algo-rithm. Though the first OPQ achieves perfect security, it supports only two operations; Inserting an element and extracting the top-priority element, which are the minimal requirement for a priority queue. In addition, this OPQ allows an adversary to observe operations in progress, which leaks the exact number of elements in the data structure. On the other hand, there are many subsequent works for OPQs that implement additional operations of a priority queue, hide the running operations, and improve efficiency. Though the recent works realize optimal efficiency, all of them achieve only statistical or computational security. Aiming to reconcile perfect security of the first OPQ with all functions (including the operation hiding) sup-ported by recent OPQs, we construct a novel perfectly secure OPQ that can simulate the following operations while hiding which one is in progress; Inserting an element, extracting the top-priority one, deleting an element, and modifying the priority of an element. The efficiency of our scheme is O(log2 N), which is larger than that of the best known statistically secure OPQ but is the same as the known perfectly secure scheme.
引用
收藏
页码:272 / 280
页数:9
相关论文
共 50 条
  • [1] Perfectly Secure Oblivious Parallel RAM
    Chan, T-H Hubert
    Nayak, Kartik
    Shi, Elaine
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 636 - 668
  • [2] Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue
    Shi, Elaine
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 842 - 858
  • [3] Funnel heap - A cache oblivious priority queue
    Brodal, GS
    Fagerberg, R
    ALGORITHMS AND COMPUTATION, PROCEEDINGS, 2002, 2518 : 219 - 228
  • [4] Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead
    Raskin, Michael
    Simkin, Mark
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 537 - 563
  • [5] Perfectly Secure Oblivious RAM without Random Oracles
    Damgard, Ivan
    Meldgaard, Sigurd
    Nielsen, Jesper Buus
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 144 - 163
  • [6] A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
    Toft, Tomas
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 20 - 33
  • [7] An optimal cache-oblivious priority queue and its application to graph algorithms
    Arge, Lars
    Bender, Michael A.
    Demaine, Erik D.
    Holland-Minkley, Bryan
    Munro, J. Ian
    SIAM JOURNAL ON COMPUTING, 2007, 36 (06) : 1672 - 1695
  • [8] A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions
    Kurosawa, Kaoru
    Kishimoto, Wataru
    Koshiba, Takeshi
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2566 - 2571
  • [9] LPS-ORAM: Perfectly Secure Oblivious RAM with Logarithmic Bandwidth Overhead
    Gong, Yunping
    Gao, Fei
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    Wen, Qiaoyan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [10] COMPOSITE PRIORITY QUEUE
    GAY, TW
    SEAMAN, PH
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1975, 19 (01) : 78 - 81