“…Therefore, researchers have been exploring ways to protect users' access patterns and various schemes have been proposed in the literature. Among them, Oblivious RAM (ORAM) [27,70,71,29,57,30,31,73,74,32,40,45,22,20,72,61,65,24,66,51,59,68,78,69,48,52,64,58,53,14,49,21,75,8,16,15,76,63,50,60,47,13,46] and Private Information Retrieval (PIR) [3,62,56,10,5,43,25,…”