Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660365
|View full text |Cite
|
Sign up to set email alerts
|

Scoram

Abstract: Oblivious RAMs (ORAMs) have traditionally been measured by their bandwidth overhead and client storage. We observe that when using ORAMs to build secure computation protocols for RAM programs, the size of the ORAM circuits is more relevant to the performance.We therefore embark on a study of the circuit-complexity of several recently proposed ORAM constructions. Our careful implementation and experiments show that asymptotic analysis is not indicative of the true performance of ORAM in secure computation proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 117 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…Some recent work explores building an ORAM for secure multi-party computation (MPC) [35]. MPC is a powerful cryptographic primitive that allows multiple parties to perform rich data analytics over their private data while preserving each party's data privacy [36].…”
Section: Secure Multi-party Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…Some recent work explores building an ORAM for secure multi-party computation (MPC) [35]. MPC is a powerful cryptographic primitive that allows multiple parties to perform rich data analytics over their private data while preserving each party's data privacy [36].…”
Section: Secure Multi-party Computationmentioning
confidence: 99%
“…That is to say, the problem setting in MPC is clearly different from our cloud database setting. Therefore, these MPC-based solutions [35]- [38] are designed for a different context and we do not evaluate them in our study.…”
Section: Secure Multi-party Computationmentioning
confidence: 99%
“…Other examples of cryptographic primitives for secure computation include Oblivious RAM (ORAM, [57,136]), homomorphic encryption (HE, [55]), and secret sharing (SS, [127]). ORAM-based approaches [46,89,148] build shared ORAM, and then data privacy is achieved by multiple rounds of interactions between the CPU and the shared memory. Since all these interactions are encrypted and the shared ORAM re-encrypts and shuffles the data whenever it is accessed, low efficiency becomes a major drawback.…”
Section: Introductionmentioning
confidence: 99%
“…This ORAM incurs an enormous overhead in bandwidth and processing time, which prevents any practical use of it. Fortunately, this first trivial ORAM was followed up by many ORAM constructions and improvements [6][7][8][9][10][11][12][13][14][15][16][17]. The basic idea in these new ORAMs, to make the data access oblivious, is to introduce an extra storage at the server and continuously and obliviously shuffle the data so that no data block is saved in its same previous location.…”
Section: Introductionmentioning
confidence: 99%