Data Structures for Limited Oblivious Execution of Programs while Preserving Locality of Reference

被引:0
|
作者
Varadarajan, Avinash V. [1 ]
Venkatesan, Ramarathnam [1 ]
Rangan, C. Pandu [1 ]
机构
[1] UC Berkeley, Div Comp Sci, Berkeley, CA 94720 USA
关键词
Oblivious Execution; Software Protection; Secure Data Structures; Oblivious Data Structures; Secure Hardware; DRM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a data structure for program execution under a limited oblivious execution model. For fully oblivious execution along the lines of Goldreich and Ostrovsky [2], one transforms a given program into a one that has totally random looking execution, based on some cryptographic assumptions and the existence of secure hardware. Totally random memory access patterns do riot respect the locality of reference in programs to which the programs generally owe their efficiency. We propose a model that limits the obliviousness so as to enable efficient execution of the program; here the adversary marks a variable and tries to produce a list of candidate locations where it may be stored in after T-steps of execution. We propose a randomized algorithm based on splay trees, and prove a lower bound on such lists.
引用
收藏
页码:63 / 69
页数:7
相关论文
共 4 条