Abstract. It has been an open question whether Oblivious RAM stored on a ma-licious server can be securely shared among multiple clients. The challenge is that ORAMs are stateful, and clients would need to exchange updated state to maintain security. However, clients often do not have a way to directly commu-nicate, and a malicious server can tamper with state information and thus break security. We answer the question of multi-client ORAM on malicious servers af-firmatively by providing several new, efficient multi-client ORAM constructions. We first extend the classical square-root ORAM by Goldreich and the hierarchical one by Goldreich and Ostrovsky to become multi-client secure. We accomplish this by separating the critical parts of the...
Oblivious RAM can hide a client's access pattern from an untrusted storage server. However current O...
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untru...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
Outsourcing data to remote storage servers has become more and more popular, but the related securit...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
We present the idea of externally verifiable oblivious RAM (ORAM). Our goal is to allow a client and...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the b...
© 2018 ACM 0004-5411/2018/04-ART18 $15.00 We present Path ORAM, an extremely simple Oblivious RAM pr...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Oblivious RAM is known as a secure protocol for hiding client's access pattern from an untrusted ser...
Hiding memory access patterns is required for secure computation, but remains prohibitively expensiv...
Oblivious RAM can hide a client's access pattern from an untrusted storage server. However current O...
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untru...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
The all increasing need for data protection has given raise to a plethora of privacy preserving cry...
Outsourcing data to remote storage servers has become more and more popular, but the related securit...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
We present the idea of externally verifiable oblivious RAM (ORAM). Our goal is to allow a client and...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the b...
© 2018 ACM 0004-5411/2018/04-ART18 $15.00 We present Path ORAM, an extremely simple Oblivious RAM pr...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Oblivious RAM is known as a secure protocol for hiding client's access pattern from an untrusted ser...
Hiding memory access patterns is required for secure computation, but remains prohibitively expensiv...
Oblivious RAM can hide a client's access pattern from an untrusted storage server. However current O...
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untru...
When multiple users and applications share the resources on cloud servers, information may be leaked...