Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660314
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious Data Structures

Abstract: We design novel, asymptotically more efficient data structures and algorithms for programs whose data access patterns exhibit some degree of predictability. To this end, we propose two novel techniques, a pointer-based technique and a locality-based technique. We show that these two techniques are powerful building blocks in making data structures and algorithms oblivious. Specifically, we apply these techniques to a broad range of commonly used data structures, including maps, sets, priority-queues, stacks, d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
196
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 150 publications
(198 citation statements)
references
References 51 publications
2
196
0
Order By: Relevance
“…For example, efficient oblivious algorithms have been demonstrated for graph algorithms [22], [23], machine learning algorithms [24], [25], and data structures [26]- [28]. The customized approach can outperform generic ORAM, but is extremely costly in terms of the amount of cryptographic expertise and time consumed.…”
Section: B Oblivm Overview and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, efficient oblivious algorithms have been demonstrated for graph algorithms [22], [23], machine learning algorithms [24], [25], and data structures [26]- [28]. The customized approach can outperform generic ORAM, but is extremely costly in terms of the amount of cryptographic expertise and time consumed.…”
Section: B Oblivm Overview and Contributionsmentioning
confidence: 99%
“…We now explain how to provide programming abstractions for a class of pointer-based oblivious data structures described by Wang et al [26]. Figure 2b gives an example, where an expert programmer provides library support for implementing a class of pointer-based data structures such that a non-specialist programmer can implement data structures which will be compiled to efficient oblivious algorithms that outperform generic ORAM.…”
Section: B Programming Abstractions For Data Structuresmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach, however, is inefficient and not practical even for small graphs since it requires storage that is quadratic in the number of nodes in the graph and a large number of costly oblivious operations. Recent work by [49] presents an oblivious data structure for computing shortest paths on planar graphs using ORAM. For a sparse planar graph with O(n) edges, their approach requires O(n 1.5 ) space complexity at the cost of O( √ n log n) online query time.…”
Section: Related Workmentioning
confidence: 99%
“…It is significantly faster than all existing ORAM constructions in secure computation setting. Further, this new scheme can also be used to build efficient oblivious data structures [36] for secure computation. Our implementation of scoram will be available online at http://www.oblivm.com.…”
Section: Contributionmentioning
confidence: 99%