This paper proposes KT-ORAM, a new hybrid ORAM-PIR con-struction, to preserve a client’s access pattern to his/her outsourced data. The construction organizes the server storage as a k-ary tree with each node acting as a fully-functional PIR storage, and adopts a novel delayed eviction technique to optimize the eviction pro-cess. KT-ORAM is proved to preserve the data access pattern pri-vacy with a negligibly-small failure probability of O(N − logN). KT-ORAM requires only a constant-size local storage at the client side, and has an asymptotical communication cost of O ( log 2 N log logN (the best known asymptotical result of ORAM [17]) when k = logN. The communication cost of KT-ORAM is also compared with two state-of-the-art ORAM construct...
Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her acces...
Oblivious RAM (ORAM) is a provable technique to protect a user’s access pattern to outsourced data. ...
Although oblivious RAM (ORAM) can hide a client’s access pattern from an untrusted server, bandwidth...
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to prote...
Abstract—Recent research results on tree-based Oblivious RAM by Shi et al. [15] obtain communication...
Abstract—Recent research results on tree-based Oblivious RAM by Shi et al. [15] obtain communication...
Oblivious Random-Access Memory (ORAM) is becoming a fundamental component for modern outsourced stor...
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untru...
Recently, server-with-computation model has been applied in Oblivious RAM scheme to achieve constant...
Oblivious RAM can hide a client’s access pattern from an untrusted server. However current ORAM algo...
We present a new, general data structure that reduces the communication cost of recent tree-based OR...
© 2018 ACM 0004-5411/2018/04-ART18 $15.00 We present Path ORAM, an extremely simple Oblivious RAM pr...
ORAM construction that can be parameterized for either small or large client storage. Simply by tuni...
Gordon, SD ORCiD: 0000-0003-4090-1199Oblivious RAM can hide a client's access pattern from an untrus...
Abstract—Recent techniques reduce ORAM communication complexity down to constant in the number of bl...
Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her acces...
Oblivious RAM (ORAM) is a provable technique to protect a user’s access pattern to outsourced data. ...
Although oblivious RAM (ORAM) can hide a client’s access pattern from an untrusted server, bandwidth...
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to prote...
Abstract—Recent research results on tree-based Oblivious RAM by Shi et al. [15] obtain communication...
Abstract—Recent research results on tree-based Oblivious RAM by Shi et al. [15] obtain communication...
Oblivious Random-Access Memory (ORAM) is becoming a fundamental component for modern outsourced stor...
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untru...
Recently, server-with-computation model has been applied in Oblivious RAM scheme to achieve constant...
Oblivious RAM can hide a client’s access pattern from an untrusted server. However current ORAM algo...
We present a new, general data structure that reduces the communication cost of recent tree-based OR...
© 2018 ACM 0004-5411/2018/04-ART18 $15.00 We present Path ORAM, an extremely simple Oblivious RAM pr...
ORAM construction that can be parameterized for either small or large client storage. Simply by tuni...
Gordon, SD ORCiD: 0000-0003-4090-1199Oblivious RAM can hide a client's access pattern from an untrus...
Abstract—Recent techniques reduce ORAM communication complexity down to constant in the number of bl...
Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her acces...
Oblivious RAM (ORAM) is a provable technique to protect a user’s access pattern to outsourced data. ...
Although oblivious RAM (ORAM) can hide a client’s access pattern from an untrusted server, bandwidth...